Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2

CSV information

Status archived
Valid from 11.04.2013
Valid until 22.04.2015
Scheme 🇺🇸 US
Manufacturer Palo Alto Networks, Inc.
Category Boundary Protection Devices and Systems
Security level EAL4+, ATE_DPT.3, ALC_FLR.2
Maintenance updates Palo Alto Networks PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 5.0.11 (09.09.2014) Certification report Security target
Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2 (21.02.2015) Certification report Security target

Heuristics summary

Certificate ID: CCEVS-VR-VID-10392-2013

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Schemes
Key Exchange
Protocols
SSH, SSHv1, SSL, TLS, IKE, VPN
Libraries
OpenSSL

Vendor
Microsoft

Security level
EAL 4, EAL 4 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.3, ATE_DPT, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3
Certificates
CCEVS-VR-VID10392-2013

Standards
FIPS 140-2, NIST SP 800-53, CCIMB-2006-09-001, CCIMB-2007-09-002, CCIMB-2007-09-003, CCIMB-2007-09-004

File metadata

Title Palo Alto Networks Inc. PA-Series Next Generation Firewall
Subject Validation Report
Author SAIC
Creation date D:20130514115641
Modification date D:20130514115641
Pages 28
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Frontpage

Certificate ID CCEVS-VR-VID10392-2013
Certified item Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 4.0.12-h2
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
AES-256, AES, HMAC, HMAC-SHA-256
Asymmetric Algorithms
RSA-2048, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
Key Exchange
Protocols
SSH, SSHv1, SSL, TLSv1.0, TLS v1.0, TLS 1.2, TLS, IKE, IKEv1, IPsec, VPN
Randomness
PRNG, RNG
Libraries
OpenSSL
Block cipher modes
ECB, CBC, CTR
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA

Vendor
Microsoft

Security level
EAL 4, EAL4, EAL4 augmented
Claims
O.ROBUST_ADMIN_GUIDANCE, O.ADMIN_ROLE, O.AUDIT_GENERATION, O.AUDIT_PROTECTION, O.AUDIT_REVIEW, O.CHANGE_MANAGEMENT, O.CORRECT_, O.CRYPTOGRAPHIC_, O.CRYPTOGRAPHY_, O.DISPLAY_BANNER, O.THOROUGH_FUNCTIONAL_, O.MAINT_MODE, O.MANAGE, O.MEDIATE, O.REPLAY_DETECTION, O.RESIDUAL_INFORMATION, O.RESOURCE_SHARING, O.SELF_PROTECTION, O.SOUND_IMPLEMENTATION, O.TIME_STAMPS, O.ROBUST_TOE_ACCESS, O.TRUSTED_PATH, O.VULNERABILITY_ANALYSIS_TEST, O.DOCUMENT_KEY_LEAKAGE, T.ADDRESS_MASQUERADE, T.ADMIN_ERROR, T.ADMIN_ROGUE, T.AUDIT_COMPROMISE, T.CRYPTO_COMPROMISE, T.MASQUERADE, T.FLAWED_DESIGN, T.FLAWED_IMPLEMENTATION, T.POOR_TEST, T.REPLAY, T.RESIDUAL_DATA, T.RESOURCE_EXHAUSTION, T.SPOOFING, T.MALICIOUS_TSF_, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNIDENTIFIED_ACTIONS, T.UNKNOWN_STATE, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.NO_TOE_BYPASS, A.UIA_ONLY, OE.CRYPTANALYTIC, OE.NO_GENERAL_PURPOSE, OE.NO_TOE_BYPASS, OE.PHYSICAL, OE.UIA_ONLY
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.1, ADV_FSP.5, ADV_TDS.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.3
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAA, FAU_SEL.1, FAU_STG, FAU_ARP, FAU_SAR, FAU_SEL, FAU_ARP.1, FAU_ARP.1.1, FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_STG.1, FAU_STG.3, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM, FCS_CKM_EXT.2, FCS_CKM.2, FCS_CKM.4, FCS_COP, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP_EXT.1, FCS_CKM_EXT, FDP_IFC.1, FDP_IFF.1, FDP_RIP, FDP_RIP.2, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_USB, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.2, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.2.1, FIA_USB.1.1, FMT_MSA, FMT_MOF.1, FMT_MTD.1, FMT_MTD.2, FMT_REV, FMT_SMR, FMT_MSA.1, FMT_REV.1, FMT_SMR.2, FMT_MOF.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_REV.1.1, FMT_REV.1.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.1, FPT_FLS, FPT_ITC, FPT_ITT, FPT_RCV, FPT_RPL, FPT_STM, FPT_TST.1, FPT_RCV.1, FPT_RPL.1, FPT_STM.1, FPT_FLS.1, FPT_FLS.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_ITT.1, FPT_ITT.1.1, FPT_RCV.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_FLT, FRU_RSA.1, FRU_FLT.1, FRU_FLT.1.1, FRU_RSA.1.1, FTA_SSL, FTA_TAB, FTA_TSE, FTA_SSL.2, FTA_SSL.3, FTA_TAB.1, FTA_TSE.1, FTA_SSL.2.1, FTA_SSL.2.2, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TSE.1.1, FTA_SSL.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Evaluation facilities
Leidos

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 180-3, FIPS140-2, NIST SP 800-57, RFC 792, CCMB-2007-09-002, CCMB-2007-09-003

File metadata

Creation date D:20150223143644-05'00'
Modification date D:20150223143644-05'00'
Pages 82

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-10392-2013

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.3

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": null,
  "dgst": "bdc993babbbfb13c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10392-2013",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.0.12",
        "3.1.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2014-09-09",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-add1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf",
        "maintenance_title": "Palo Alto Networks PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 5.0.11"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2015-02-21",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-add2.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf",
        "maintenance_title": "Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2"
      }
    ]
  },
  "manufacturer": "Palo Alto Networks, Inc.",
  "manufacturer_web": "https://www.paloaltonetworks.com/",
  "name": "Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2",
  "not_valid_after": "2015-04-22",
  "not_valid_before": "2013-04-11",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10392-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10392-2013",
        "cert_item": "Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 4.0.12-h2",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10392-2013": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.3": 4,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL 4 augmented": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 2
        },
        "SSH": {
          "SSH": 8,
          "SSHv1": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 12
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 8
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-2006-09-001": 1,
          "CCIMB-2007-09-002": 1,
          "CCIMB-2007-09-003": 1,
          "CCIMB-2007-09-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 1
        },
        "NIST": {
          "NIST SP 800-53": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "SAIC",
      "/CreationDate": "D:20130514115641",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20130514115641",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Validation Report",
      "/Title": "Palo Alto Networks Inc. PA-Series Next Generation Firewall",
      "pdf_file_size_bytes": 483560,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    },
    "st_filename": "st_vid10392-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 6,
            "Diffie-Hellman": 4
          }
        },
        "RSA": {
          "RSA-2048": 2
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_GENERAL_PURPOSE": 1,
          "A.NO_TOE_BYPASS": 1,
          "A.PHYSICAL": 1,
          "A.UIA_ONLY": 1
        },
        "O": {
          "O.ADMIN_ROLE": 1,
          "O.AUDIT_GENERATION": 1,
          "O.AUDIT_PROTECTION": 1,
          "O.AUDIT_REVIEW": 1,
          "O.CHANGE_MANAGEMENT": 1,
          "O.CORRECT_": 1,
          "O.CRYPTOGRAPHIC_": 1,
          "O.CRYPTOGRAPHY_": 1,
          "O.DISPLAY_BANNER": 1,
          "O.DOCUMENT_KEY_LEAKAGE": 1,
          "O.MAINT_MODE": 2,
          "O.MANAGE": 2,
          "O.MEDIATE": 4,
          "O.REPLAY_DETECTION": 1,
          "O.RESIDUAL_INFORMATION": 1,
          "O.RESOURCE_SHARING": 1,
          "O.ROBUST_ADMIN_GUIDANCE": 1,
          "O.ROBUST_TOE_ACCESS": 1,
          "O.SELF_PROTECTION": 2,
          "O.SOUND_IMPLEMENTATION": 1,
          "O.THOROUGH_FUNCTIONAL_": 1,
          "O.TIME_STAMPS": 1,
          "O.TRUSTED_PATH": 1,
          "O.VULNERABILITY_ANALYSIS_TEST": 1
        },
        "OE": {
          "OE.CRYPTANALYTIC": 1,
          "OE.NO_GENERAL_PURPOSE": 1,
          "OE.NO_TOE_BYPASS": 1,
          "OE.PHYSICAL": 1,
          "OE.UIA_ONLY": 1
        },
        "T": {
          "T.ADDRESS_MASQUERADE": 1,
          "T.ADMIN_ERROR": 1,
          "T.ADMIN_ROGUE": 1,
          "T.AUDIT_COMPROMISE": 1,
          "T.CRYPTO_COMPROMISE": 1,
          "T.FLAWED_DESIGN": 1,
          "T.FLAWED_IMPLEMENTATION": 1,
          "T.MALICIOUS_TSF_": 1,
          "T.MASQUERADE": 1,
          "T.POOR_TEST": 1,
          "T.REPLAY": 1,
          "T.RESIDUAL_DATA": 1,
          "T.RESOURCE_EXHAUSTION": 1,
          "T.SPOOFING": 1,
          "T.UNATTENDED_SESSION": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNIDENTIFIED_ACTIONS": 1,
          "T.UNKNOWN_STATE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 10,
          "ADV_FSP": 1,
          "ADV_FSP.4": 11,
          "ADV_FSP.5": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 7,
          "ADV_INT.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.3": 15,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 15,
          "ALC_CMS": 1,
          "ALC_CMS.4": 6,
          "ALC_DEL": 1,
          "ALC_DEL.1": 5,
          "ALC_DVS": 1,
          "ALC_DVS.1": 5,
          "ALC_FLR": 1,
          "ALC_FLR.2": 16,
          "ALC_LCD": 1,
          "ALC_LCD.1": 6,
          "ALC_TAT": 1,
          "ALC_TAT.1": 7
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 5,
          "ATE_DPT": 1,
          "ATE_DPT.3": 9,
          "ATE_FUN": 1,
          "ATE_FUN.1": 8,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL4": 3,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 2,
          "FAU_ARP.1": 4,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 10,
          "FAU_GEN.1": 4,
          "FAU_GEN.2": 1,
          "FAU_SAA": 7,
          "FAU_SAA.1": 2,
          "FAU_SAR": 4,
          "FAU_SAR.1": 3,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 4,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 3,
          "FAU_SAR.3.1": 1,
          "FAU_SEL": 5,
          "FAU_SEL.1": 2,
          "FAU_STG": 10,
          "FAU_STG.1": 4,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 4,
          "FAU_STG.3.1": 1
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 9,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 3,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 5,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXT": 1,
          "FCS_CKM_EXT.2": 1,
          "FCS_COP": 1,
          "FCS_COP.1": 27,
          "FCS_COP.1.1": 6,
          "FCS_COP_EXT.1": 1
        },
        "FDP": {
          "FDP_IFC.1": 19,
          "FDP_IFC.1.1": 3,
          "FDP_IFF.1": 21,
          "FDP_IFF.1.1": 3,
          "FDP_IFF.1.2": 5,
          "FDP_IFF.1.3": 3,
          "FDP_IFF.1.4": 3,
          "FDP_IFF.1.5": 3,
          "FDP_IFF.1.6": 2,
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2,
          "FDP_RIP": 1,
          "FDP_RIP.2": 3,
          "FDP_RIP.2.1": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 4,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_ATD.1": 4,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 5,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 1,
          "FIA_UID.2": 3,
          "FIA_UID.2.1": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 3,
          "FIA_USB.1.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 25,
          "FMT_MOF.1.1": 7,
          "FMT_MSA": 11,
          "FMT_MSA.1": 5,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 24,
          "FMT_MTD.1.1": 7,
          "FMT_MTD.2": 10,
          "FMT_MTD.2.1": 2,
          "FMT_MTD.2.2": 2,
          "FMT_REV": 1,
          "FMT_REV.1": 3,
          "FMT_REV.1.1": 1,
          "FMT_REV.1.2": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 1,
          "FMT_SMR.2": 3,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 2
        },
        "FPT": {
          "FPT_FLS": 2,
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 1,
          "FPT_ITC": 3,
          "FPT_ITC.1": 5,
          "FPT_ITC.1.1": 1,
          "FPT_ITT": 2,
          "FPT_ITT.1": 6,
          "FPT_ITT.1.1": 1,
          "FPT_RCV": 1,
          "FPT_RCV.1": 3,
          "FPT_RCV.1.1": 1,
          "FPT_RPL": 1,
          "FPT_RPL.1": 3,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 2,
          "FPT_TST.1.2": 2,
          "FPT_TST.1.3": 2
        },
        "FRU": {
          "FRU_FLT": 2,
          "FRU_FLT.1": 6,
          "FRU_FLT.1.1": 1,
          "FRU_RSA.1": 11,
          "FRU_RSA.1.1": 2
        },
        "FTA": {
          "FTA_SSL": 4,
          "FTA_SSL.1": 1,
          "FTA_SSL.2": 4,
          "FTA_SSL.2.1": 1,
          "FTA_SSL.2.2": 1,
          "FTA_SSL.3": 5,
          "FTA_SSL.3.1": 1,
          "FTA_TAB": 1,
          "FTA_TAB.1": 4,
          "FTA_TAB.1.1": 1,
          "FTA_TSE": 1,
          "FTA_TSE.1": 3,
          "FTA_TSE.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 2,
          "FTP_ITC.1.2": 2,
          "FTP_ITC.1.3": 2,
          "FTP_TRP.1": 8,
          "FTP_TRP.1.1": 2,
          "FTP_TRP.1.2": 2,
          "FTP_TRP.1.3": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 6
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 13,
          "IKEv1": 2
        },
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 14,
          "SSHv1": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 22
          },
          "TLS": {
            "TLS": 3,
            "TLS 1.2": 1,
            "TLS v1.0": 3,
            "TLSv1.0": 1
          }
        },
        "VPN": {
          "VPN": 40
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 15
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-256": 1,
            "SHA-384": 2,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RNG": 8
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2007-09-002": 1,
          "CCMB-2007-09-003": 1
        },
        "FIPS": {
          "FIPS 140-2": 12,
          "FIPS 180-3": 1,
          "FIPS PUB 140-2": 7,
          "FIPS140-2": 1
        },
        "NIST": {
          "NIST SP 800-57": 3
        },
        "RFC": {
          "RFC 792": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7,
            "AES-256": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 5,
            "HMAC-SHA-256": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 1
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20150223143644-05\u002700\u0027",
      "/ModDate": "D:20150223143644-05\u002700\u0027",
      "pdf_file_size_bytes": 1237301,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#2323"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 82
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ATE_DPT.3",
      "ALC_FLR.2",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6c04c77c48f77c3375dbe27b4f2f80eb91669d900f03691c92fdc56ea3579e62",
      "txt_hash": "0a3e870002c44dac329887b1803d2393921d6892f24030f22dee07164ea67801"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e1e900922cc893f1d721bddb7d4312e53732b05a38da3c0733ff667a5060f628",
      "txt_hash": "794d90d286ed54320eb8a4515cba2e0eee02461977ff110d95e660e688ed3586"
    }
  },
  "status": "archived"
}