CA Technologies ACF2 r14 SP1 for z/OS

CSV information ?

Status archived
Valid from 04.04.2011
Valid until 01.11.2014
Scheme 🇺🇸 US
Manufacturer CA Technologies
Category Access Control Devices and Systems
Security level ASE_TSS.2, ALC_FLR.1, EAL4+

Heuristics summary ?

Certificate ID: CCEVS-VR-VID-10416-2011

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
CMAC
Hash functions
SHA-1
Schemes
MAC

Trusted Execution Environments
PSP

Security level
EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ASE_TSS.2
Certificates
CCEVS-VR-VID10416-2011
Evaluation facilities
Booz Allen Hamilton

Certification process
out of scope, boundary. It does not matter if they are installed on the Operational Environment because they are out of scope for the requirements in this evaluation as explained below. EUA – Extended User Authentication

Standards
x.509

File metadata

Creation date D:20110614165328
Modification date D:20110614165328
Pages 21
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Frontpage

Certificate ID CCEVS-VR-VID10416-2011
Certified item CAACF2™ r14 SP1 for z/OS
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
CMAC
Hash functions
SHA-1
Schemes
MAC
Protocols
SSL

Trusted Execution Environments
PSP

Security level
EAL 4, EAL4, EAL4 augmented
Claims
O.ACCESS, O.AUDIT, O.AUTH, O.MANAGE, O.ROBUST_ADMIN_GUIDANCE, O.ROBUST_TOE_ACCESS, O.ROBUST_ADMIN_GUIDANC, O.ROBUST_ADMIN_GUIDA, T.ACCESS, T.ADMIN_ERROR, T.AUDIT_COMPROMISE, T.MASK, A.ADMIN, A.PATCHES, A.NOEVIL, A.LOCATE, OE.ADMIN, OE.EAVESDROPPING, OE.NOEVIL, OE.LOCATE, OE.SYSTIME
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ALC_CMC, ALC_DVS, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SEL.1.1, FDP_ACC.2, FDP_ACF.1, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.4, FIA_UAU.5, FIA_UID.2, FIA_USB.1, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_TSE.1, FTA_TSE.1.1
Evaluation facilities
Booz Allen Hamilton

Certification process
out of scope, boundary. It does not matter if they are installed on the Operational Environment because they are out of scope for the requirements in this evaluation as explained below. EUA – Extended User Authentication

Standards
PKCS #12, x.509, X.509, CCMB-2007-09-004

File metadata

Creation date D:20110614164900
Modification date D:20110614164900
Pages 108
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics ?

Certificate ID: CCEVS-VR-VID-10416-2011

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ADV_TDS.3, AVA_VAN.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ASE_TSS.2, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ASE_ECD.1, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ALC_FLR.1, ATE_DPT.2, ASE_OBJ.2

Scheme data ?

Product CA ACF2 r14 SP1 for z/OS
Id CCEVS-VR-VID10416
Url https://www.niap-ccevs.org/product/10416
Certification Date 04.04.2011
Expiration Date 01.11.2014
Category Enterprise Security Management
Vendor CA Technologies
Evaluation Facility Booz Allen Hamilton Common Criteria Testing Laboratory
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2011-04-04', 'expiration_date': '2014-11-01'} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c4c2fb7c98d31bee9c7482541cd0258ee546ae2daa70e9dc31a6212e00b8f6dd', 'txt_hash': '5618ed6a976c505703a5b92c61d150326ce167f1856d1026463e1c575ecb97a6'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2434366fc1e0341e5bd2269758821f9a6bffb6011ea5b1c039b2c3cdd4cb5542', 'txt_hash': '5f6785d82a9b945ccc6f2cfbbc5c0e97771ec5e5ff68de1f3d859ebf3384a2c1'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 428812, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/Producer': 'Microsoft® Office Word 2007', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110614165328', '/ModDate': 'D:20110614165328', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1133122, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 108, '/Producer': 'Microsoft® Office Word 2007', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110614164900', '/ModDate': 'D:20110614164900', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-VID10416-2011', 'cert_item': 'CAACF2™ r14 SP1 for z/OS', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10416-2011': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2}, 'ASE': {'ASE_TSS.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BoozAllenHamilton': {'Booz Allen Hamilton': 2}}, 'symmetric_crypto': {'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 6}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'AMD': {'PSP': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'x.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'boundary. It does not matter if they are installed on the Operational Environment because they are out of scope for the requirements in this evaluation as explained below. EUA – Extended User Authentication': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL4': 6, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 14, 'ADV_FSP.4': 13, 'ADV_IMP.1': 9, 'ADV_TDS.3': 17}, 'AGD': {'AGD_OPE.1': 15, 'AGD_PRE.1': 11}, 'ALC': {'ALC_CMC.4': 17, 'ALC_CMS.4': 8, 'ALC_DEL.1': 10, 'ALC_DVS.1': 8, 'ALC_FLR.1': 13, 'ALC_LCD.1': 8, 'ALC_TAT.1': 9, 'ALC_CMC': 1, 'ALC_DVS': 2, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 7, 'ATE_DPT.2': 8, 'ATE_FUN.1': 10, 'ATE_IND.2': 9}, 'AVA': {'AVA_VAN.3': 9}, 'ASE': {'ASE_CCL.1': 13, 'ASE_ECD.1': 12, 'ASE_INT.1': 14, 'ASE_OBJ.2': 12, 'ASE_REQ.2': 15, 'ASE_SPD.1': 9, 'ASE_TSS.2': 13}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 19, 'FAU_GEN.2': 8, 'FAU_SAR.1': 19, 'FAU_SAR.2': 8, 'FAU_SEL.1': 10, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_SAR.2.1': 1, 'FAU_SEL.1.1': 1}, 'FDP': {'FDP_ACC.2': 20, 'FDP_ACF.1': 22, 'FDP_ACC.1': 4, 'FDP_ACC.2.1': 2, 'FDP_ACC.2.2': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_ATD.1': 10, 'FIA_SOS.1': 18, 'FIA_UAU.2': 12, 'FIA_UAU.4': 12, 'FIA_UAU.5': 12, 'FIA_UID.2': 12, 'FIA_USB.1': 9, 'FIA_UID.1': 4, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_UAU.1': 2, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MOF.1': 41, 'FMT_MSA.1': 10, 'FMT_MSA.3': 7, 'FMT_SMF.1': 14, 'FMT_SMR.1': 14, 'FMT_MTD.1': 3, 'FMT_MOF.1.1': 4, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 3}, 'FTA': {'FTA_TSE.1': 8, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.ACCESS': 6, 'O.AUDIT': 5, 'O.AUTH': 4, 'O.MANAGE': 4, 'O.ROBUST_ADMIN_GUIDANCE': 1, 'O.ROBUST_TOE_ACCESS': 4, 'O.ROBUST_ADMIN_GUIDANC': 1, 'O.ROBUST_ADMIN_GUIDA': 2}, 'T': {'T.ACCESS': 4, 'T.ADMIN_ERROR': 4, 'T.AUDIT_COMPROMISE': 3, 'T.MASK': 6}, 'A': {'A.ADMIN': 3, 'A.PATCHES': 3, 'A.NOEVIL': 3, 'A.LOCATE': 3}, 'OE': {'OE.ADMIN': 5, 'OE.EAVESDROPPING': 2, 'OE.NOEVIL': 3, 'OE.LOCATE': 3, 'OE.SYSTIME': 3}}, 'vendor': {}, 'eval_facility': {'BoozAllenHamilton': {'Booz Allen Hamilton': 4}}, 'symmetric_crypto': {'constructions': {'MAC': {'CMAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 36}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'AMD': {'PSP': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS #12': 1}, 'X509': {'x.509': 1, 'X.509': 3}, 'CC': {'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'boundary. It does not matter if they are installed on the Operational Environment because they are out of scope for the requirements in this evaluation as explained below. EUA – Extended User Authentication': 1}}}.
    • The report_filename property was set to st_vid10416-vr.pdf.
    • The st_filename property was set to st_vid10416-st.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-VID-10416-2011.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10416-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10416-st.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CA Technologies ACF2 r14 SP1 for z/OS was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "7e1f7bf26ab5c177",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10416-2011",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Enterprise Security Management",
      "certification_date": "2011-04-04",
      "evaluation_facility": "Booz Allen Hamilton Common Criteria Testing Laboratory",
      "expiration_date": "2014-11-01",
      "id": "CCEVS-VR-VID10416",
      "product": "CA ACF2 r14 SP1 for z/OS",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/10416",
      "vendor": "CA Technologies"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "CA Technologies",
  "manufacturer_web": "https://www.ca.com",
  "name": "CA Technologies ACF2 r14 SP1 for z/OS",
  "not_valid_after": "2014-11-01",
  "not_valid_before": "2011-04-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10416-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10416-2011",
        "cert_item": "CAACF2\u2122 r14 SP1 for z/OS",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10416-2011": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 3,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "boundary. It does not matter if they are installed on the Operational Environment because they are out of scope for the requirements in this evaluation as explained below.  EUA \u2013 Extended User Authentication": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BoozAllenHamilton": {
          "Booz Allen Hamilton": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "X509": {
          "x.509": 1
        }
      },
      "symmetric_crypto": {
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "AMD": {
          "PSP": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20110614165328",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110614165328",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 428812,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "st_vid10416-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.LOCATE": 3,
          "A.NOEVIL": 3,
          "A.PATCHES": 3
        },
        "O": {
          "O.ACCESS": 6,
          "O.AUDIT": 5,
          "O.AUTH": 4,
          "O.MANAGE": 4,
          "O.ROBUST_ADMIN_GUIDA": 2,
          "O.ROBUST_ADMIN_GUIDANC": 1,
          "O.ROBUST_ADMIN_GUIDANCE": 1,
          "O.ROBUST_TOE_ACCESS": 4
        },
        "OE": {
          "OE.ADMIN": 5,
          "OE.EAVESDROPPING": 2,
          "OE.LOCATE": 3,
          "OE.NOEVIL": 3,
          "OE.SYSTIME": 3
        },
        "T": {
          "T.ACCESS": 4,
          "T.ADMIN_ERROR": 4,
          "T.AUDIT_COMPROMISE": 3,
          "T.MASK": 6
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 14,
          "ADV_FSP.4": 13,
          "ADV_IMP.1": 9,
          "ADV_TDS.3": 17
        },
        "AGD": {
          "AGD_OPE.1": 15,
          "AGD_PRE.1": 11
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 17,
          "ALC_CMS.4": 8,
          "ALC_DEL.1": 10,
          "ALC_DVS": 2,
          "ALC_DVS.1": 8,
          "ALC_FLR.1": 13,
          "ALC_LCD.1": 8,
          "ALC_TAT": 1,
          "ALC_TAT.1": 9
        },
        "ASE": {
          "ASE_CCL.1": 13,
          "ASE_ECD.1": 12,
          "ASE_INT.1": 14,
          "ASE_OBJ.2": 12,
          "ASE_REQ.2": 15,
          "ASE_SPD.1": 9,
          "ASE_TSS.2": 13
        },
        "ATE": {
          "ATE_COV.2": 7,
          "ATE_DPT.2": 8,
          "ATE_FUN.1": 10,
          "ATE_IND.2": 9
        },
        "AVA": {
          "AVA_VAN.3": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL4": 6,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 19,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 19,
          "FAU_SAR.1.1": 2,
          "FAU_SAR.1.2": 2,
          "FAU_SAR.2": 8,
          "FAU_SAR.2.1": 1,
          "FAU_SEL.1": 10,
          "FAU_SEL.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 4,
          "FDP_ACC.2": 20,
          "FDP_ACC.2.1": 2,
          "FDP_ACC.2.2": 2,
          "FDP_ACF.1": 22,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 18,
          "FIA_SOS.1.1": 2,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 12,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.4": 12,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 12,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID.1": 4,
          "FIA_UID.2": 12,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 9,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 41,
          "FMT_MOF.1.1": 4,
          "FMT_MSA.1": 10,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 7,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 3,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 14,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 3
        },
        "FTA": {
          "FTA_TSE.1": 8,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "boundary. It does not matter if they are installed on the Operational Environment because they are out of scope for the requirements in this evaluation as explained below.  EUA \u2013 Extended User Authentication": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 3
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 36
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BoozAllenHamilton": {
          "Booz Allen Hamilton": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2007-09-004": 1
        },
        "PKCS": {
          "PKCS #12": 1
        },
        "X509": {
          "X.509": 3,
          "x.509": 1
        }
      },
      "symmetric_crypto": {
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "AMD": {
          "PSP": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20110614164900",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110614164900",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 1133122,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 108
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10416-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "ASE_TSS.2",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10416-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c4c2fb7c98d31bee9c7482541cd0258ee546ae2daa70e9dc31a6212e00b8f6dd",
      "txt_hash": "5618ed6a976c505703a5b92c61d150326ce167f1856d1026463e1c575ecb97a6"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2434366fc1e0341e5bd2269758821f9a6bffb6011ea5b1c039b2c3cdd4cb5542",
      "txt_hash": "5f6785d82a9b945ccc6f2cfbbc5c0e97771ec5e5ff68de1f3d859ebf3384a2c1"
    }
  },
  "status": "archived"
}