This page was not yet optimized for use on mobile
devices.
RSA Archer GRC Platform version 6.1
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | archived |
|---|---|
| Valid from | 14.09.2016 |
| Valid until | 14.09.2021 |
| Scheme | 🇲🇾 MY |
| Manufacturer | RSA, The Security Division of EMC |
| Category | Network and Network-Related Devices and Systems |
| Security level | EAL2+, ALC_FLR.2 |
Heuristics summary
Certificate ID: ISCB-3-RPT-C073-CR-v1
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Protocols
SSLSecurity level
EAL 2+, EAL2+Security Assurance Requirements (SAR)
ALC_FLR.2Certificates
ISCB-3-RPT-C073-CR-v1Standards
ISO/IEC15408, ISO/IEC 18045File metadata
| Title | C073 Certification Report |
|---|---|
| Subject | RSA Archer GRC Platform v6.1 |
| Keywords | MyCB_TMP_002 |
| Author | ISCB Department |
| Creation date | D:20160919032647Z |
| Modification date | D:20160919115230+08'00' |
| Pages | 30 |
| Creator | Microsoft Word |
Security target
Extracted keywords
Vendor
MicrosoftSecurity level
EAL2, EAL 2, EAL 2 augmentedClaims
O.ACCESS_CONTROL, O.AUDIT, O.AUDIT_REVIEW, O.I_AND_A, O.LOGON_BANNER, O.PASSWORD_CONTROLS, O.SECURITY_MANAGEMENT, O.SESSION_LIMITATION, O.SESSION_TERMINATION, O.THROTTLE, O.SECURITY_MANAGE, T.BRUTE_FORCE, T.DATA_COMPROMISE, T.INAPPROPRIATE_USE, T.NO_ACCOUNTABILITY, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACTIVITY, T.UNAUTHORIZED_ACTIVIT, T.INAPPRORIATE_USE, A.MANAGE, A.PROTECT, A.SECURE_COMMS, A.TIME, OE.PHYSICAL, OE.PERSONNEL, OE.SECURE_COMMS, OE.TIMESecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_FLR.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MSA, FMT_MTD, FMT_REV, FMT_SMF, FMT_SMR, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_REV.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_SSL, FTA_TAB, FTA_TSE, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL.4, FTA_SSL.4.1, FTA_TAB.1, FTA_TAB.1.1, FTA_TSE.1, FTA_TSE.1.1File metadata
| Title | RSA Archer GRC |
|---|---|
| Subject | Security Target |
| Author | Apted, Tony J. [RA] |
| Creation date | D:20160919034256+00'00' |
| Modification date | D:20160919034256+00'00' |
| Pages | 41 |
| Creator | Microsoft Word |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ISCB-3-RPT-C073-CR-v1Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2017-14369 | MEDIUM | 4.3 | 1.4 | 11.10.2017 | ||
| CVE-2017-14370 | MEDIUM | 5.4 | 2.7 | 11.10.2017 | ||
| CVE-2017-14371 | MEDIUM | 6.1 | 2.7 | 11.10.2017 | ||
| CVE-2017-14372 | MEDIUM | 6.1 | 2.7 | 11.10.2017 | ||
| CVE-2018-15780 | MEDIUM | 6.5 | 3.6 | 03.01.2019 | ||
| CVE-2019-3715 | MEDIUM | 5.5 | 3.6 | 13.03.2019 | ||
| CVE-2019-3716 | HIGH | 7.8 | 5.9 | 13.03.2019 | ||
Showing 5 out of 7.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "71ffe2f11819ba1d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-3-RPT-C073-CR-v1",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:rsa:archer_grc_platform:6.1:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2018-15780",
"CVE-2017-14371",
"CVE-2019-3716",
"CVE-2017-14372",
"CVE-2019-3715",
"CVE-2017-14369",
"CVE-2017-14370"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "RSA, The Security Division of EMC",
"manufacturer_web": "https://www.rsa.com/",
"name": "RSA Archer GRC Platform version 6.1",
"not_valid_after": "2021-09-14",
"not_valid_before": "2016-09-14",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C073-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-3-RPT-C073-CR-v1": 28
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 2+": 7,
"EAL2+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ISCB Department",
"/CreationDate": "D:20160919032647Z",
"/Creator": "Microsoft Word",
"/Keywords": "MyCB_TMP_002",
"/ModDate": "D:20160919115230+08\u002700\u0027",
"/Subject": "RSA Archer GRC Platform v6.1",
"/Title": "C073 Certification Report",
"pdf_file_size_bytes": 656895,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.cybersecurity.my/mycc"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 30
},
"st_filename": "RSA Archer ST v1.0 -clean.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.MANAGE": 2,
"A.PROTECT": 2,
"A.SECURE_COMMS": 3,
"A.TIME": 2
},
"O": {
"O.ACCESS_CONTROL": 5,
"O.AUDIT": 4,
"O.AUDIT_REVIEW": 5,
"O.I_AND_A": 3,
"O.LOGON_BANNER": 5,
"O.PASSWORD_CONTROLS": 3,
"O.SECURITY_MANAGE": 2,
"O.SECURITY_MANAGEMENT": 3,
"O.SESSION_LIMITATION": 5,
"O.SESSION_TERMINATION": 3,
"O.THROTTLE": 5
},
"OE": {
"OE.PERSONNEL": 2,
"OE.PHYSICAL": 2,
"OE.SECURE_COMMS": 2,
"OE.TIME": 3
},
"T": {
"T.BRUTE_FORCE": 3,
"T.DATA_COMPROMISE": 2,
"T.INAPPROPRIATE_USE": 2,
"T.INAPPRORIATE_USE": 1,
"T.NO_ACCOUNTABILITY": 2,
"T.UNATTENDED_SESSION": 3,
"T.UNAUTHORIZED_ACCESS": 2,
"T.UNAUTHORIZED_ACTIVIT": 1,
"T.UNAUTHORIZED_ACTIVITY": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 10,
"ADV_FSP": 1,
"ADV_FSP.2": 11,
"ADV_TDS": 1,
"ADV_TDS.1": 11
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.2": 8,
"ALC_CMS": 1,
"ALC_CMS.2": 6,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 15
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 14,
"ASE_ECD": 1,
"ASE_ECD.1": 10,
"ASE_INT": 1,
"ASE_INT.1": 12,
"ASE_OBJ": 1,
"ASE_OBJ.2": 10,
"ASE_REQ": 1,
"ASE_REQ.2": 13,
"ASE_SPD": 1,
"ASE_SPD.1": 7,
"ASE_TSS": 1,
"ASE_TSS.1": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 4,
"ATE_FUN": 1,
"ATE_FUN.1": 8,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL 2 augmented": 2,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 6,
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAR": 9,
"FAU_SAR.1": 9,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 4,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1
},
"FCS": {
"FCS_COP.1": 2,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 10,
"FDP_ACC.1.1": 1,
"FDP_ACF": 3,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS": 3,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU": 6,
"FIA_UAU.1": 1,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.6": 5,
"FIA_UAU.6.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 5,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA": 5,
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 6,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 2,
"FMT_REV": 3,
"FMT_REV.1": 4,
"FMT_REV.1.1": 1,
"FMT_REV.1.2": 1,
"FMT_SMF": 2,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 2
},
"FTA": {
"FTA_SSL": 6,
"FTA_SSL.3": 5,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 5,
"FTA_SSL.4.1": 1,
"FTA_TAB": 3,
"FTA_TAB.1": 5,
"FTA_TAB.1.1": 1,
"FTA_TSE": 3,
"FTA_TSE.1": 4,
"FTA_TSE.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 9
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Apted, Tony J. [RA]",
"/CreationDate": "D:20160919034256+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20160919034256+00\u002700\u0027",
"/Subject": "Security Target",
"/Title": "RSA Archer GRC",
"pdf_file_size_bytes": 1185222,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 41
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C073-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%20ST%20v1.0%20-clean.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f493566f85e002e83324295aff98c227155123cea46ff73d9b92868685644059",
"txt_hash": "512fed3b69e4ecda51c3b41d6df2bc804833229db3d89125729673e6f4c9b57c"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "43f6befb48745f5208bd6286469b1b35f5b1a2e6038ceac83f2277b0c640fc2b",
"txt_hash": "ae27d1e37f140bfbd680ec5f7151ca3be372120166ab540c516c6272a1b664ab"
}
},
"status": "archived"
}