{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf",
"dgst": "c86ad5ef88d4cf8b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-3-RPT-C115-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2021-004-C115",
"certification_date": "2021-06-23",
"developer": "Certis CISCO Security Pte Ltd (Certis)",
"enhanced": {
"assurance_level": "EAL2",
"category": "Other Devices and Systems",
"cert_id": "C115",
"certification_date": "2021-06-23",
"developer": "Certis Cyber Competency Centre20 Jalan Afifi Singapore 409179 T: +65 6856 8799E: [email protected] https://www.certisgroup.com",
"expiration_date": "2026-06-23",
"mutual_recognition": "CCRA",
"product": "Argus Command Center Web Portal Stable V.2.1",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C115/ISCB-5-RPT-C119-CR-v1.pdf",
"scope": "The Target of Evaluation (TOE) is a web-based command centre application of the Argus System called the Argus Command Centre Web Portal (Argus CC) which provides the use for two primary purposes as an officer (security personnel) support system; security operations management and account management through the Internet. The user roles defined in the Argus CC consist of System Administrator, Account Owner, Managers, Operators, Supervisors and Officers. Supervisors and Officers are managed by TOE users but are themselves not TOE users and are thus omitted from the scope of this evaluation. Fundamentally, the TOE can be accessed by consumers via selected web browsers (front-end Command Centre).",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C115/2019_Certis_Cisco__Argus_CC_EAL2__Security_Target_ASE-v1.14_2-smallsize.pdf",
"type": "Other Devices and Systems"
},
"expiration_date": "2026-06-23",
"level": "EAL2",
"product": "Argus Command Center Web Portal Stable V.2.1",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/130"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Certis CISCO Security Pte Ltd (Certis)",
"manufacturer_web": "https://www.certisgroup.com/",
"name": "Argus Command Center Web Portal Stable Version 2.1",
"not_valid_after": "2026-06-23",
"not_valid_before": "2021-06-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C115-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20210630131348Z",
"/Creator": "Word",
"/ModDate": "D:20210630215915+08\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
"pdf_file_size_bytes": 205722,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-5-RPT-C115-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-3-RPT-C115-CR-v1": 35
}
},
"cc_claims": {
"A": {
"A.CLOUD": 1,
"A.CONNECTIVITY": 1,
"A.DDOS": 1,
"A.MALWARE": 1,
"A.THIRDPARTY": 1,
"A.TIMESTAMP": 1,
"A.TRUSTED_ADMIN": 1,
"A.TRUSTED_DEV": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 6
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC.1": 14,
"FDP_ACF.1": 1
},
"FIA": {
"FIA_AFL.1": 2,
"FIA_ATD.1": 5,
"FIA_SOS.1": 3,
"FIA_SOS.2": 2,
"FIA_UAU.1": 2,
"FIA_UID.1": 7
},
"FMT": {
"FMT_MSA.1": 7,
"FMT_SMF.1": 3,
"FMT_SMR.1": 3
},
"FTP": {
"FTP_ITC.1": 17,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS 1.2": 1,
"TLSv1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 5
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210629084408Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20210629084408Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
"pdf_file_size_bytes": 800031,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "2019 Certis Cisco \u2013 Argus CC EAL2 \u2013 Security Target [ASE]-v1.14 2.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CLOUD": 3,
"A.CONNECTIVITY": 4,
"A.DDOS": 3,
"A.MALWARE": 4,
"A.THIRDPARTY": 3,
"A.TIMESTAMP": 4,
"A.TRUSTED_ADMIN": 4,
"A.TRUSTED_DEV": 3
},
"O": {
"O.SEC_ACCESS": 5,
"O.SEC_AUTHENTICATE": 5,
"O.SEC_COMMUNICATION": 5,
"O.SEC_PASSWORD_GENER": 1,
"O.SEC_PASSWORD_GENERATION": 3
},
"OE": {
"OE.ADMINISTRATOR": 3,
"OE.ANTI_DDOS": 3,
"OE.ANTI_MALWARE": 3,
"OE.DEVELOPER": 3,
"OE.SAFE_CLOUD": 3,
"OE.SAFE_CONNECTIVITY": 3,
"OE.SYN_TIMESTAMP": 3,
"OE.THIRDPARTY": 3
},
"T": {
"T.BROKEN_AUTH": 4,
"T.INTERCEPTION": 4,
"T.UNAUTHORIZED_AC": 1,
"T.UNAUTHORIZED_ACCESS": 2,
"T.WEAK_PASSWORD_": 1,
"T.WEAK_PASSWORD_GENE": 1,
"T.WEAK_PASSWORD_GENERATION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 4
},
"ASE": {
"ASE_CCL.1": 3,
"ASE_ECD": 1,
"ASE_ECD.1": 3,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 5,
"ASE_SPD.1": 3,
"ASE_TSS.1": 3
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 11
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC.1": 8,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_SOS.2": 5,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 6,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 8,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 9,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 5,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope": 1,
"environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and": 1,
"infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: \u2022 Amazon Web Service (AWS) host, \u2022 database host(s); \u2022 mobile device(s": 1,
"inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the": 1,
"out of scope": 5,
"together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS 1.2": 3,
"TLSv1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"SPA": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 7
},
"Samsung": {
"Samsung": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "CLAIREHYC",
"/CreationDate": "D:20210701124256+08\u002700\u0027",
"/Creator": "PDFCreator Free 4.2.0",
"/Keywords": "",
"/ModDate": "D:20210701124256+08\u002700\u0027",
"/Producer": "GPL Ghostscript 9.52",
"/Subject": "",
"/Title": "2019 Certis Cisco \u2013 Argus CC EAL2 \u2013 Security Target [ASE]-v1.14",
"pdf_file_size_bytes": 1022047,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20\u2013%20Argus%20CC%20EAL2%20\u2013%20Security%20Target%20[ASE]-v1.14%202.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "fc2cb9a4772830d7b14e816f2d46aad5bfaa7d2c4a64620dd195a9cb9fe3a082",
"txt_hash": "626edb526c4ad2df4ba576de449da8218114b250c3e28f12e09aae9d4649c96a"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "309e06af0ee8d7ff15c1dcbb4eeb853798b2c4d23b5729d60f3265acb043dd0f",
"txt_hash": "4dcabd774290a4d5e25c8d685282a5b5a8e46022ce51a80df50dd8497ee02bb2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "5512b8f95c223c4349bc9bc2f611f6a336afd1e13cea51e52211959d9d7b9b0b",
"txt_hash": "f3160f8243c7f7ab6f114fe75a8018343bfea0305efd10cdfbe0d5af2de4ce0b"
}
},
"status": "active"
}