RSA Archer GRC Platform version 6.1
CSV information ?
Status | archived |
---|---|
Valid from | 14.09.2016 |
Valid until | 14.09.2021 |
Scheme | 🇲🇾 MY |
Manufacturer | RSA, The Security Division of EMC |
Category | Network and Network-Related Devices and Systems |
Security level | ALC_FLR.2, EAL2+ |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSLSecurity level
EAL 2+, EAL2+Security Assurance Requirements (SAR)
ALC_FLR.2Certificates
ISCB-3-RPT-C073-CR-v1Standards
ISO/IEC15408, ISO/IEC 18045File metadata
Title | C073 Certification Report |
---|---|
Subject | RSA Archer GRC Platform v6.1 |
Keywords | MyCB_TMP_002 |
Author | ISCB Department |
Creation date | D:20160919032647Z |
Modification date | D:20160919115230+08'00' |
Pages | 30 |
Creator | Microsoft Word |
Security target ?
Extracted keywords
Vendor
MicrosoftSecurity level
EAL2, EAL 2, EAL 2 augmentedClaims
O.ACCESS_CONTROL, O.AUDIT, O.AUDIT_REVIEW, O.I_AND_A, O.LOGON_BANNER, O.PASSWORD_CONTROLS, O.SECURITY_MANAGEMENT, O.SESSION_LIMITATION, O.SESSION_TERMINATION, O.THROTTLE, O.SECURITY_MANAGE, T.BRUTE_FORCE, T.DATA_COMPROMISE, T.INAPPROPRIATE_USE, T.NO_ACCOUNTABILITY, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACTIVITY, T.UNAUTHORIZED_ACTIVIT, T.INAPPRORIATE_USE, A.MANAGE, A.PROTECT, A.SECURE_COMMS, A.TIME, OE.PHYSICAL, OE.PERSONNEL, OE.SECURE_COMMS, OE.TIMESecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_FLR.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MSA, FMT_MTD, FMT_REV, FMT_SMF, FMT_SMR, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_REV.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_SSL, FTA_TAB, FTA_TSE, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL.4, FTA_SSL.4.1, FTA_TAB.1, FTA_TAB.1.1, FTA_TSE.1, FTA_TSE.1.1File metadata
Title | RSA Archer GRC |
---|---|
Subject | Security Target |
Author | Apted, Tony J. [RA] |
Creation date | D:20160919034256+00'00' |
Modification date | D:20160919034256+00'00' |
Pages | 41 |
Creator | Microsoft Word |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2017-14369 | MEDIUM | 4.3 | 1.4 | 11.10.2017 19:29 | ||
CVE-2017-14370 | MEDIUM | 5.4 | 2.7 | 11.10.2017 19:29 | ||
CVE-2017-14371 | MEDIUM | 6.1 | 2.7 | 11.10.2017 19:29 | ||
CVE-2017-14372 | MEDIUM | 6.1 | 2.7 | 11.10.2017 19:29 | ||
CVE-2018-11059 | MEDIUM | 5.4 | 2.7 | 24.07.2018 19:29 | ||
CVE-2018-11060 | HIGH | 8.8 | 5.9 | 24.07.2018 19:29 | ||
CVE-2018-11065 | MEDIUM | 4.3 | 1.4 | 24.08.2018 15:29 | ||
CVE-2018-15780 | MEDIUM | 6.5 | 3.6 | 03.01.2019 21:29 | ||
CVE-2019-3715 | MEDIUM | 5.5 | 3.6 | 13.03.2019 21:29 | ||
CVE-2019-3716 | HIGH | 7.8 | 5.9 | 13.03.2019 21:29 | ||
CVE-2019-3756 | MEDIUM | 6.5 | 3.6 | 18.09.2019 23:15 | ||
CVE-2019-3758 | CRITICAL | 9.8 | 5.9 | 18.09.2019 23:15 | ||
CVE-2020-5331 | MEDIUM | 5.5 | 3.6 | 04.05.2020 19:15 | ||
CVE-2020-5332 | HIGH | 7.2 | 5.9 | 04.05.2020 19:15 | ||
CVE-2020-5333 | MEDIUM | 4.3 | 1.4 | 04.05.2020 19:15 | ||
CVE-2020-5334 | MEDIUM | 6.1 | 2.7 | 04.05.2020 19:15 | ||
CVE-2020-5335 | HIGH | 8.8 | 5.9 | 04.05.2020 19:15 | ||
CVE-2020-5336 | MEDIUM | 6.1 | 2.7 | 04.05.2020 19:15 | ||
CVE-2020-5337 | MEDIUM | 6.1 | 2.7 | 04.05.2020 19:15 | ||
CVE-2021-33615 | HIGH | 7.5 | 5.9 | 02.06.2022 14:15 | ||
CVE-2021-33616 | MEDIUM | 5.4 | 2.7 | 04.04.2022 12:15 | ||
CVE-2021-38362 | MEDIUM | 6.5 | 3.6 | 30.03.2022 22:15 | ||
CVE-2021-41594 | MEDIUM | 6.5 | 3.6 | 30.03.2022 00:15 | ||
CVE-2022-26947 | MEDIUM | 5.4 | 2.7 | 30.03.2022 00:15 | ||
CVE-2022-26948 | HIGH | 7.5 | 3.6 | 30.03.2022 00:15 | ||
CVE-2022-26949 | MEDIUM | 6.5 | 3.6 | 30.03.2022 00:15 | ||
CVE-2022-26950 | MEDIUM | 6.1 | 2.7 | 30.03.2022 00:15 | ||
CVE-2022-26951 | MEDIUM | 6.1 | 2.7 | 30.03.2022 00:15 | ||
CVE-2022-37317 | MEDIUM | 5.4 | 2.7 | 25.08.2022 23:15 |
Scheme data ?
Cert No | 2016-003-C073 | |
---|---|---|
Developer | RSA Security LLC | |
Level | EAL2+ ALC_FLR.2 | |
Product | RSA Archer GRC Platform version 6.1 | |
Certification Date | 14.09.2016 | |
Expiration Date | 14.09.2021 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/114 | |
Enhanced | ||
Developer | Jon L. GoodwinManager, Federal ProgramsRSA Security LLC10700 Parkridge Blvd.Suite 600Reston, VA 20191 URL: www.rsa.comEmail: [email protected]: 469-855-5658 | |
Status | Archive | |
Scope | It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. The following security functions are implemented by the TOE: Security Audit User Data Protection Identification adn Authentication Security Management TOE Access | |
Cert Id | C073 | |
Category | Network and Network-Related Devices and Systems | |
Assurance Level | EAL2+ ALC_FLR.2 | |
Product | RSA Archer GRC Platform version 6.1 | |
Certification Date | 14.09.2016 | |
Expiration Date | 14.09.2021 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/RSA%20Archer%20ST%20v1.0%20-clean.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/ISCB-5-RPT-C073-CR-v1.pdf | |
Type | Network and Network related Devices and Systems |
References ?
No references are available for this certificate.
Updates ?
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL2+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The report property was updated, with the
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2016-09-14', 'expiration_date': '2021-09-14', 'enhanced': {'__update__': {'developer': 'Jon L. GoodwinManager, Federal ProgramsRSA Security LLC10700 Parkridge Blvd.Suite 600Reston, VA 20191 URL: www.rsa.comEmail: [email protected]: 469-855-5658', 'scope': 'It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. The following security functions are implemented by the TOE: Security Audit User Data Protection Identification adn Authentication Security Management TOE Access', 'certification_date': '2016-09-14', 'expiration_date': '2021-09-14'}}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2020-5332', 'CVE-2019-3756', 'CVE-2019-3715', 'CVE-2019-3716', 'CVE-2020-5335', 'CVE-2018-15780', 'CVE-2020-5337', 'CVE-2019-3758', 'CVE-2020-5336', 'CVE-2020-5333', 'CVE-2020-5334', 'CVE-2020-5331']}
values added.
- The related_cves property was updated, with the
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2020-5332', 'CVE-2019-3756', 'CVE-2019-3716', 'CVE-2019-3715', 'CVE-2020-5335', 'CVE-2018-15780', 'CVE-2020-5337', 'CVE-2020-5336', 'CVE-2019-3758', 'CVE-2020-5333', 'CVE-2020-5334', 'CVE-2020-5331']}
values discarded.
- The related_cves property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f493566f85e002e83324295aff98c227155123cea46ff73d9b92868685644059', 'txt_hash': '512fed3b69e4ecda51c3b41d6df2bc804833229db3d89125729673e6f4c9b57c'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '43f6befb48745f5208bd6286469b1b35f5b1a2e6038ceac83f2277b0c640fc2b', 'txt_hash': 'ae27d1e37f140bfbd680ec5f7151ca3be372120166ab540c516c6272a1b664ab'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 656895, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 30, '/Author': 'ISCB Department', '/CreationDate': 'D:20160919032647Z', '/Creator': 'Microsoft Word', '/Keywords': 'MyCB_TMP_002', '/ModDate': "D:20160919115230+08'00'", '/Subject': 'RSA Archer GRC Platform v6.1', '/Title': 'C073 Certification Report', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.cybersecurity.my/mycc']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1185222, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 41, '/Title': 'RSA Archer GRC', '/Author': 'Apted, Tony J. [RA]', '/Subject': 'Security Target', '/Creator': 'Microsoft Word', '/CreationDate': "D:20160919034256+00'00'", '/ModDate': "D:20160919034256+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-3-RPT-C073-CR-v1': 28}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2+': 7, 'EAL2+': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 8}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 3, 'EAL 2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.2': 11, 'ADV_TDS.1': 11}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 15, 'ALC_FLR.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_FLR': 1, 'ALC_CMC.2': 8, 'ALC_CMS.2': 6, 'ALC_DEL.1': 5}, 'ATE': {'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.2': 7}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 14, 'ASE_ECD.1': 10, 'ASE_INT.1': 12, 'ASE_OBJ.2': 10, 'ASE_REQ.2': 13, 'ASE_SPD.1': 7, 'ASE_TSS.1': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN': 6, 'FAU_SAR': 9, 'FAU_GEN.1': 10, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_SAR.1': 9, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 4, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 5, 'FAU_SAR.3.1': 1}, 'FCS': {'FCS_COP.1': 2, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC': 1, 'FDP_ACF': 3, 'FDP_ACC.1': 10, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 6, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL': 3, 'FIA_ATD': 3, 'FIA_SOS': 3, 'FIA_UAU': 6, 'FIA_UID': 2, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU.2': 8, 'FIA_UAU.2.1': 1, 'FIA_UAU.6': 5, 'FIA_UAU.6.1': 1, 'FIA_UID.2': 9, 'FIA_UID.2.1': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 1}, 'FMT': {'FMT_MSA': 5, 'FMT_MTD': 1, 'FMT_REV': 3, 'FMT_SMF': 2, 'FMT_SMR': 2, 'FMT_MSA.1': 7, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 7, 'FMT_MTD.1.1': 2, 'FMT_REV.1': 4, 'FMT_REV.1.1': 1, 'FMT_REV.1.2': 1, 'FMT_SMF.1': 10, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 12, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 2}, 'FTA': {'FTA_SSL': 6, 'FTA_TAB': 3, 'FTA_TSE': 3, 'FTA_SSL.3': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL.4': 5, 'FTA_SSL.4.1': 1, 'FTA_TAB.1': 5, 'FTA_TAB.1.1': 1, 'FTA_TSE.1': 4, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 5, 'O.AUDIT': 4, 'O.AUDIT_REVIEW': 5, 'O.I_AND_A': 3, 'O.LOGON_BANNER': 5, 'O.PASSWORD_CONTROLS': 3, 'O.SECURITY_MANAGEMENT': 3, 'O.SESSION_LIMITATION': 5, 'O.SESSION_TERMINATION': 3, 'O.THROTTLE': 5, 'O.SECURITY_MANAGE': 2}, 'T': {'T.BRUTE_FORCE': 3, 'T.DATA_COMPROMISE': 2, 'T.INAPPROPRIATE_USE': 2, 'T.NO_ACCOUNTABILITY': 2, 'T.UNATTENDED_SESSION': 3, 'T.UNAUTHORIZED_ACCESS': 2, 'T.UNAUTHORIZED_ACTIVITY': 2, 'T.UNAUTHORIZED_ACTIVIT': 1, 'T.INAPPRORIATE_USE': 1}, 'A': {'A.MANAGE': 2, 'A.PROTECT': 2, 'A.SECURE_COMMS': 3, 'A.TIME': 2}, 'OE': {'OE.PHYSICAL': 2, 'OE.PERSONNEL': 2, 'OE.SECURE_COMMS': 2, 'OE.TIME': 3}}, 'vendor': {'Microsoft': {'Microsoft': 9}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C073-CR-v1.pdf
. - The st_filename property was set to
RSA Archer ST v1.0 -clean.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-3-RPT-C073-CR-v1
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C073-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%20ST%20v1.0%20-clean.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name RSA Archer GRC Platform version 6.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "71ffe2f11819ba1d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-3-RPT-C073-CR-v1",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:rsa:archer_grc_platform:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:archer:6.1.0.0:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2017-14372",
"CVE-2021-33615",
"CVE-2018-11059",
"CVE-2019-3756",
"CVE-2020-5337",
"CVE-2022-26949",
"CVE-2022-26951",
"CVE-2020-5332",
"CVE-2021-41594",
"CVE-2020-5336",
"CVE-2022-26950",
"CVE-2020-5334",
"CVE-2019-3715",
"CVE-2020-5331",
"CVE-2021-33616",
"CVE-2020-5335",
"CVE-2017-14369",
"CVE-2018-11060",
"CVE-2021-38362",
"CVE-2022-26947",
"CVE-2018-15780",
"CVE-2019-3758",
"CVE-2020-5333",
"CVE-2017-14370",
"CVE-2022-37317",
"CVE-2022-26948",
"CVE-2018-11065",
"CVE-2019-3716",
"CVE-2017-14371"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2016-003-C073",
"certification_date": "2016-09-14",
"developer": "RSA Security LLC",
"enhanced": {
"assurance_level": "EAL2+ ALC_FLR.2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C073",
"certification_date": "2016-09-14",
"developer": "Jon L. GoodwinManager, Federal ProgramsRSA Security LLC10700 Parkridge Blvd.Suite 600Reston, VA 20191 URL: www.rsa.comEmail: [email protected]: 469-855-5658",
"expiration_date": "2021-09-14",
"mutual_recognition": "CCRA",
"product": "RSA Archer GRC Platform version 6.1",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/ISCB-5-RPT-C073-CR-v1.pdf",
"scope": "It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. The following security functions are implemented by the TOE: Security Audit User Data Protection Identification adn Authentication Security Management TOE Access",
"status": "Archive",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/RSA%20Archer%20ST%20v1.0%20-clean.pdf",
"type": "Network and Network related Devices and Systems"
},
"expiration_date": "2021-09-14",
"level": "EAL2+ ALC_FLR.2",
"product": "RSA Archer GRC Platform version 6.1",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/114"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "RSA, The Security Division of EMC",
"manufacturer_web": "https://www.rsa.com/",
"name": "RSA Archer GRC Platform version 6.1",
"not_valid_after": "2021-09-14",
"not_valid_before": "2016-09-14",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C073-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-3-RPT-C073-CR-v1": 28
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 2+": 7,
"EAL2+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ISCB Department",
"/CreationDate": "D:20160919032647Z",
"/Creator": "Microsoft Word",
"/Keywords": "MyCB_TMP_002",
"/ModDate": "D:20160919115230+08\u002700\u0027",
"/Subject": "RSA Archer GRC Platform v6.1",
"/Title": "C073 Certification Report",
"pdf_file_size_bytes": 656895,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cybersecurity.my/mycc",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 30
},
"st_filename": "RSA Archer ST v1.0 -clean.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.MANAGE": 2,
"A.PROTECT": 2,
"A.SECURE_COMMS": 3,
"A.TIME": 2
},
"O": {
"O.ACCESS_CONTROL": 5,
"O.AUDIT": 4,
"O.AUDIT_REVIEW": 5,
"O.I_AND_A": 3,
"O.LOGON_BANNER": 5,
"O.PASSWORD_CONTROLS": 3,
"O.SECURITY_MANAGE": 2,
"O.SECURITY_MANAGEMENT": 3,
"O.SESSION_LIMITATION": 5,
"O.SESSION_TERMINATION": 3,
"O.THROTTLE": 5
},
"OE": {
"OE.PERSONNEL": 2,
"OE.PHYSICAL": 2,
"OE.SECURE_COMMS": 2,
"OE.TIME": 3
},
"T": {
"T.BRUTE_FORCE": 3,
"T.DATA_COMPROMISE": 2,
"T.INAPPROPRIATE_USE": 2,
"T.INAPPRORIATE_USE": 1,
"T.NO_ACCOUNTABILITY": 2,
"T.UNATTENDED_SESSION": 3,
"T.UNAUTHORIZED_ACCESS": 2,
"T.UNAUTHORIZED_ACTIVIT": 1,
"T.UNAUTHORIZED_ACTIVITY": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 10,
"ADV_FSP": 1,
"ADV_FSP.2": 11,
"ADV_TDS": 1,
"ADV_TDS.1": 11
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.2": 8,
"ALC_CMS": 1,
"ALC_CMS.2": 6,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 15
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 14,
"ASE_ECD": 1,
"ASE_ECD.1": 10,
"ASE_INT": 1,
"ASE_INT.1": 12,
"ASE_OBJ": 1,
"ASE_OBJ.2": 10,
"ASE_REQ": 1,
"ASE_REQ.2": 13,
"ASE_SPD": 1,
"ASE_SPD.1": 7,
"ASE_TSS": 1,
"ASE_TSS.1": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 4,
"ATE_FUN": 1,
"ATE_FUN.1": 8,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL 2 augmented": 2,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 6,
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAR": 9,
"FAU_SAR.1": 9,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 4,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1
},
"FCS": {
"FCS_COP.1": 2,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 10,
"FDP_ACC.1.1": 1,
"FDP_ACF": 3,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS": 3,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU": 6,
"FIA_UAU.1": 1,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.6": 5,
"FIA_UAU.6.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 5,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA": 5,
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 6,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 2,
"FMT_REV": 3,
"FMT_REV.1": 4,
"FMT_REV.1.1": 1,
"FMT_REV.1.2": 1,
"FMT_SMF": 2,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 2
},
"FTA": {
"FTA_SSL": 6,
"FTA_SSL.3": 5,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 5,
"FTA_SSL.4.1": 1,
"FTA_TAB": 3,
"FTA_TAB.1": 5,
"FTA_TAB.1.1": 1,
"FTA_TSE": 3,
"FTA_TSE.1": 4,
"FTA_TSE.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 9
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Apted, Tony J. [RA]",
"/CreationDate": "D:20160919034256+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20160919034256+00\u002700\u0027",
"/Subject": "Security Target",
"/Title": "RSA Archer GRC",
"pdf_file_size_bytes": 1185222,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 41
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C073-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%20ST%20v1.0%20-clean.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f493566f85e002e83324295aff98c227155123cea46ff73d9b92868685644059",
"txt_hash": "512fed3b69e4ecda51c3b41d6df2bc804833229db3d89125729673e6f4c9b57c"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "43f6befb48745f5208bd6286469b1b35f5b1a2e6038ceac83f2277b0c640fc2b",
"txt_hash": "ae27d1e37f140bfbd680ec5f7151ca3be372120166ab540c516c6272a1b664ab"
}
},
"status": "archived"
}