This page was not yet optimized for use on mobile
devices.
Argus Command Center Web Portal Stable Version 2.1
CSV information
| Status | active |
|---|---|
| Valid from | 23.06.2021 |
| Valid until | 23.06.2026 |
| Scheme | 🇲🇾 MY |
| Manufacturer | Certis CISCO Security Pte Ltd (Certis) |
| Category | Other Devices and Systems |
| Security level | EAL2 |
Heuristics summary
Certificate ID: ISCB-3-RPT-C115-CR-v1
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Certification report
Extracted keywords
Protocols
TLSv1.2, TLS 1.2Vendor
CiscoSecurity level
EAL2, EAL 2Claims
A.TRUSTED_ADMIN, A.TRUSTED_DEV, A.TIMESTAMP, A.CLOUD, A.MALWARE, A.DDOS, A.CONNECTIVITY, A.THIRDPARTYSecurity Assurance Requirements (SAR)
ALC_DEL.1, ALC_CMS.2Security Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.1, FIA_ATD.1, FIA_SOS.2, FIA_UID.1, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FTP_ITC.1, FTP_TRP.1Certificates
ISCB-3-RPT-C115-CR-v1Standards
ISO/IEC15408, ISO/IEC 18045File metadata
| Creation date | D:20210629084408Z00'00' |
|---|---|
| Modification date | D:20210629084408Z00'00' |
| Pages | 36 |
| Creator | Word |
| Producer | macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext |
Security target
Extracted keywords
Protocols
TLS 1.2, TLSv1.2Vendor
Samsung, CiscoSecurity level
EAL2, EAL 2Claims
O.SEC_ACCESS, O.SEC_AUTHENTICATE, O.SEC_COMMUNICATION, O.SEC_PASSWORD_GENERATION, O.SEC_PASSWORD_GENER, T.BROKEN_AUTH, T.UNAUTHORIZED_ACCESS, T.INTERCEPTION, T.WEAK_PASSWORD_GENE, T.WEAK_PASSWORD_GENERATION, T.UNAUTHORIZED_AC, T.WEAK_PASSWORD_, A.TRUSTED_ADMIN, A.TRUSTED_DEV, A.TIMESTAMP, A.CLOUD, A.MALWARE, A.DDOS, A.CONNECTIVITY, A.THIRDPARTY, OE.ADMINISTRATOR, OE.DEVELOPER, OE.SYN_TIMESTAMP, OE.SAFE_CLOUD, OE.ANTI_MALWARE, OE.ANTI_DDOS, OE.SAFE_CONNECTIVITY, OE.THIRDPARTYSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_ECD.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1, ASE_ECDSecurity Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_AFL.1, FIA_UAU.1, FIA_ATD.1, FIA_SOS.1, FIA_SOS.2, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.3, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
SPACertification process
out of scope, AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope, infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s, inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the, environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and, together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hostingFile metadata
| Title | 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 |
|---|---|
| Author | CLAIREHYC |
| Creation date | D:20210701124256+08'00' |
| Modification date | D:20210701124256+08'00' |
| Pages | 46 |
| Creator | PDFCreator Free 4.2.0 |
| Producer | GPL Ghostscript 9.52 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ISCB-3-RPT-C115-CR-v1Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Scheme data
| Cert No | 2021-004-C115 | |
|---|---|---|
| Developer | Certis CISCO Security Pte Ltd (Certis) | |
| Level | EAL2 | |
| Product | Argus Command Center Web Portal Stable V.2.1 | |
| Certification Date | 23.06.2021 | |
| Expiration Date | 23.06.2026 | |
| Recognition | CCRA | |
| Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/130 | |
| Enhanced | ||
| Developer | Certis Cyber Competency Centre20 Jalan Afifi Singapore 409179 T: +65 6856 8799E: [email protected] https://www.certisgroup.com | |
| Status | Valid | |
| Scope | The Target of Evaluation (TOE) is a web-based command centre application of the Argus System called the Argus Command Centre Web Portal (Argus CC) which provides the use for two primary purposes as an officer (security personnel) support system; security operations management and account management through the Internet. The user roles defined in the Argus CC consist of System Administrator, Account Owner, Managers, Operators, Supervisors and Officers. Supervisors and Officers are managed by TOE users but are themselves not TOE users and are thus omitted from the scope of this evaluation. Fundamentally, the TOE can be accessed by consumers via selected web browsers (front-end Command Centre). | |
| Cert Id | C115 | |
| Category | Other Devices and Systems | |
| Assurance Level | EAL2 | |
| Product | Argus Command Center Web Portal Stable V.2.1 | |
| Certification Date | 23.06.2021 | |
| Expiration Date | 23.06.2026 | |
| Mutual Recognition | CCRA | |
| Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C115/2019_Certis_Cisco__Argus_CC_EAL2__Security_Target_ASE-v1.14_2-smallsize.pdf | |
| Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C115/ISCB-5-RPT-C119-CR-v1.pdf | |
| Type | Other Devices and Systems | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf",
"dgst": "c86ad5ef88d4cf8b",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-3-RPT-C115-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2021-004-C115",
"certification_date": "2021-06-23",
"developer": "Certis CISCO Security Pte Ltd (Certis)",
"enhanced": {
"assurance_level": "EAL2",
"category": "Other Devices and Systems",
"cert_id": "C115",
"certification_date": "2021-06-23",
"developer": "Certis Cyber Competency Centre20 Jalan Afifi Singapore 409179 T: +65 6856 8799E: [email protected] https://www.certisgroup.com",
"expiration_date": "2026-06-23",
"mutual_recognition": "CCRA",
"product": "Argus Command Center Web Portal Stable V.2.1",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C115/ISCB-5-RPT-C119-CR-v1.pdf",
"scope": "The Target of Evaluation (TOE) is a web-based command centre application of the Argus System called the Argus Command Centre Web Portal (Argus CC) which provides the use for two primary purposes as an officer (security personnel) support system; security operations management and account management through the Internet. The user roles defined in the Argus CC consist of System Administrator, Account Owner, Managers, Operators, Supervisors and Officers. Supervisors and Officers are managed by TOE users but are themselves not TOE users and are thus omitted from the scope of this evaluation. Fundamentally, the TOE can be accessed by consumers via selected web browsers (front-end Command Centre).",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C115/2019_Certis_Cisco__Argus_CC_EAL2__Security_Target_ASE-v1.14_2-smallsize.pdf",
"type": "Other Devices and Systems"
},
"expiration_date": "2026-06-23",
"level": "EAL2",
"product": "Argus Command Center Web Portal Stable V.2.1",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/130"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Certis CISCO Security Pte Ltd (Certis)",
"manufacturer_web": "https://www.certisgroup.com/",
"name": "Argus Command Center Web Portal Stable Version 2.1",
"not_valid_after": "2026-06-23",
"not_valid_before": "2021-06-23",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "ISCB-5-CERT-C115-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C115-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-3-RPT-C115-CR-v1": 35
}
},
"cc_claims": {
"A": {
"A.CLOUD": 1,
"A.CONNECTIVITY": 1,
"A.DDOS": 1,
"A.MALWARE": 1,
"A.THIRDPARTY": 1,
"A.TIMESTAMP": 1,
"A.TRUSTED_ADMIN": 1,
"A.TRUSTED_DEV": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 6
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC.1": 14,
"FDP_ACF.1": 1
},
"FIA": {
"FIA_AFL.1": 2,
"FIA_ATD.1": 5,
"FIA_SOS.1": 3,
"FIA_SOS.2": 2,
"FIA_UAU.1": 2,
"FIA_UID.1": 7
},
"FMT": {
"FMT_MSA.1": 7,
"FMT_SMF.1": 3,
"FMT_SMR.1": 3
},
"FTP": {
"FTP_ITC.1": 17,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS 1.2": 1,
"TLSv1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 5
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210629084408Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20210629084408Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
"pdf_file_size_bytes": 800031,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "2019 Certis Cisco \u2013 Argus CC EAL2 \u2013 Security Target [ASE]-v1.14 2.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CLOUD": 3,
"A.CONNECTIVITY": 4,
"A.DDOS": 3,
"A.MALWARE": 4,
"A.THIRDPARTY": 3,
"A.TIMESTAMP": 4,
"A.TRUSTED_ADMIN": 4,
"A.TRUSTED_DEV": 3
},
"O": {
"O.SEC_ACCESS": 5,
"O.SEC_AUTHENTICATE": 5,
"O.SEC_COMMUNICATION": 5,
"O.SEC_PASSWORD_GENER": 1,
"O.SEC_PASSWORD_GENERATION": 3
},
"OE": {
"OE.ADMINISTRATOR": 3,
"OE.ANTI_DDOS": 3,
"OE.ANTI_MALWARE": 3,
"OE.DEVELOPER": 3,
"OE.SAFE_CLOUD": 3,
"OE.SAFE_CONNECTIVITY": 3,
"OE.SYN_TIMESTAMP": 3,
"OE.THIRDPARTY": 3
},
"T": {
"T.BROKEN_AUTH": 4,
"T.INTERCEPTION": 4,
"T.UNAUTHORIZED_AC": 1,
"T.UNAUTHORIZED_ACCESS": 2,
"T.WEAK_PASSWORD_": 1,
"T.WEAK_PASSWORD_GENE": 1,
"T.WEAK_PASSWORD_GENERATION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 4
},
"ASE": {
"ASE_CCL.1": 3,
"ASE_ECD": 1,
"ASE_ECD.1": 3,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 5,
"ASE_SPD.1": 3,
"ASE_TSS.1": 3
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 11
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC.1": 8,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_SOS.2": 5,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 6,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 8,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 9,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 5,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope": 1,
"environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and": 1,
"infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: \u2022 Amazon Web Service (AWS) host, \u2022 database host(s); \u2022 mobile device(s": 1,
"inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the": 1,
"out of scope": 5,
"together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS 1.2": 3,
"TLSv1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"SPA": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 7
},
"Samsung": {
"Samsung": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "CLAIREHYC",
"/CreationDate": "D:20210701124256+08\u002700\u0027",
"/Creator": "PDFCreator Free 4.2.0",
"/Keywords": "",
"/ModDate": "D:20210701124256+08\u002700\u0027",
"/Producer": "GPL Ghostscript 9.52",
"/Subject": "",
"/Title": "2019 Certis Cisco \u2013 Argus CC EAL2 \u2013 Security Target [ASE]-v1.14",
"pdf_file_size_bytes": 1022047,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20\u2013%20Argus%20CC%20EAL2%20\u2013%20Security%20Target%20[ASE]-v1.14%202.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "fc2cb9a4772830d7b14e816f2d46aad5bfaa7d2c4a64620dd195a9cb9fe3a082",
"txt_hash": "626edb526c4ad2df4ba576de449da8218114b250c3e28f12e09aae9d4649c96a"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "309e06af0ee8d7ff15c1dcbb4eeb853798b2c4d23b5729d60f3265acb043dd0f",
"txt_hash": "4dcabd774290a4d5e25c8d685282a5b5a8e46022ce51a80df50dd8497ee02bb2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "5512b8f95c223c4349bc9bc2f611f6a336afd1e13cea51e52211959d9d7b9b0b",
"txt_hash": "f3160f8243c7f7ab6f114fe75a8018343bfea0305efd10cdfbe0d5af2de4ce0b"
}
},
"status": "active"
}