HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2

CSV information

Status archived
Valid from 18.03.2015
Valid until 18.03.2020
Scheme 🇲🇾 MY
Manufacturer HP TippingPoint
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.2, EAL3+
Maintenance updates HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0 (07.04.2015) Certification report Security target
Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.8.2 (21.07.2016) Certification report Security target
Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0 (25.04.2016) Certification report Security target

Heuristics summary

Certificate ID: ISCB-5-RPT-C055-CR-v1

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Schemes
MAC
Protocols
SSHv2, SSH, SSL

Security level
EAL3, EAL2
Security Assurance Requirements (SAR)
ALC_FLR.2
Security Functional Requirements (SFR)
FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_SEL.1.1, FMT_SMF.1.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Certificates
ISCB-5-RPT-C055-CR-v1

Standards
FIPS 140-2, ISO/IEC15408, ISO/IEC 18045

File metadata

Title C055 Certification Report
Subject HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
Keywords HP TippingPoint Intrusion Prevention System
Author ISCB Department
Creation date D:20150318142844+08'00'
Modification date D:20150318142844+08'00'
Pages 29
Creator Microsoft® Word 2013
Producer Microsoft® Word 2013

Security target

Extracted keywords

Symmetric Algorithms
AES, RC2, RC4, DES, 3DES, Blowfish
Asymmetric Algorithms
DSA
Schemes
MAC
Protocols
SSH, SSHv2, SSL
Libraries
OpenSSL

Security level
EAL 3, EAL3, EAL 3 augmented
Claims
O.SENSOR, O.ANALYZER, O.RESPONSE, O.REVIEW, O.ADMIN, O.ACCESS, O.AUDIT, O.INTEGRITY, O.STORAGE, O.TRAFFIC, T.COMPROMISE, T.LOSSOF, T.PRIVILEGE, T.CONFIG, T.INFLUX, T.ACCOUNT, T.MISUSE, T.ACCIDENT, T.MALICE, A.ACCESS, A.PROTECT, A.MANAGE, A.NOEVIL, OE.INSTALL, OE.PHYSICAL, OE.PERSONNEL, OE.CONFID
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_SEL, FAU_STG, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.2, FAU_SEL.1, FAU_STG.4, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_STG.1, FDP_IFC, FDP_IFF, FDP_IFF.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UAU.1, FIA_UID.1, FMT_MTD.1, FMT_MOF, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.3, FPT_STM, FPT_STM.1, FPT_STM.1.1, FTP_TRP, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Evaluation facilities
Leidos

Side-channel analysis
malfunction

Standards
FIPS 140-2, X.509

File metadata

Creation date D:20150318142909+08'00'
Modification date D:20150318142917+08'00'
Pages 58
Producer Foxit Reader PDF Printer Version 7.0.1.831

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ISCB-5-RPT-C055-CR-v1

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Scheme data

Cert No 2015-001-C055
Developer Trend Micro TippingPoint
Level EAL3+ALC_FLR.2
Product Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
Certification Date 18.03.2015
Expiration Date 18.03.2020
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/120
Enhanced
Developer Freddy MercadoGlobal Compliance EngineerTrend Micro - TippingPointTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 – USA URL:http://www.trendmicro.com/
Status Archive
Scope The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols. The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured. The scope of evaluation covers major security features as follows: Security Audit: The TOE is able to generate auditable events for the basic level of audit. Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE. Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction. TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data. Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.
Cert Id C055
Category Network and Network-Related Devices and Systems
Assurance Level EAL3+ALC_FLR.2
Product Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
Certification Date 18.03.2015
Expiration Date 18.03.2020
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/TippingPointST%201-0.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/ISCB-5-RPT-C055-CR-v1.pdf
Type Hardware-based intrusion prevention systems

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "2cfde4db66d5e375",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C055-CR-v1",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL3+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.7.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2015-001-C055",
      "certification_date": "2015-03-18",
      "developer": "Trend Micro TippingPoint",
      "enhanced": {
        "assurance_level": "EAL3+ALC_FLR.2",
        "category": "Network and Network-Related Devices and Systems",
        "cert_id": "C055",
        "certification_date": "2015-03-18",
        "developer": "Freddy MercadoGlobal Compliance EngineerTrend Micro - TippingPointTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 \u2013 USA URL:http://www.trendmicro.com/",
        "expiration_date": "2020-03-18",
        "mutual_recognition": "CCRA",
        "product": "Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/ISCB-5-RPT-C055-CR-v1.pdf",
        "scope": "The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols. The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured. The scope of evaluation covers major security features as follows: Security Audit: The TOE is able to generate auditable events for the basic level of audit. Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE. Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction. TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data. Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.",
        "status": "Archive",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/TippingPointST%201-0.pdf",
        "type": "Hardware-based intrusion prevention systems"
      },
      "expiration_date": "2020-03-18",
      "level": "EAL3+ALC_FLR.2",
      "product": "Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/120"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-07-21",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M005-AMR-v1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%202-2.pdf",
        "maintenance_title": "Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.8.2"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-04-25",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M003-AMR-v2.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%202-1-clean.pdf",
        "maintenance_title": "Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2015-04-07",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055A-AMR-v1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%202-0.pdf",
        "maintenance_title": "HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0"
      }
    ]
  },
  "manufacturer": "HP TippingPoint",
  "manufacturer_web": "https://www.hp.com/",
  "name": "HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2",
  "not_valid_after": "2020-03-18",
  "not_valid_before": "2015-03-18",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ISCB-5-RPT-C055-CR-v1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C055-CR-v1": 28
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL3": 8
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SEL.1.1": 1,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.4.1": 1
        },
        "FMT": {
          "FMT_MTD.1.1": 2,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1.1": 1
        },
        "FTP": {
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 3,
          "SSHv2": 4
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1
        },
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ISCB Department",
      "/CreationDate": "D:20150318142844+08\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/Keywords": "HP TippingPoint Intrusion Prevention System",
      "/ModDate": "D:20150318142844+08\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "/Subject": "HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2",
      "/Title": "C055 Certification Report",
      "pdf_file_size_bytes": 733406,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "mailto:[email protected]",
          "http://www.cybersecurity.my/mycc"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "TippingPointST 1-0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DSA": {
            "DSA": 2
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 3,
          "A.MANAGE": 3,
          "A.NOEVIL": 2,
          "A.PROTECT": 2
        },
        "O": {
          "O.ACCESS": 4,
          "O.ADMIN": 4,
          "O.ANALYZER": 6,
          "O.AUDIT": 4,
          "O.INTEGRITY": 3,
          "O.RESPONSE": 7,
          "O.REVIEW": 6,
          "O.SENSOR": 7,
          "O.STORAGE": 4,
          "O.TRAFFIC": 3
        },
        "OE": {
          "OE.CONFID": 2,
          "OE.INSTALL": 2,
          "OE.PERSONNEL": 2,
          "OE.PHYSICAL": 2
        },
        "T": {
          "T.ACCIDENT": 2,
          "T.ACCOUNT": 2,
          "T.COMPROMISE": 3,
          "T.CONFIG": 2,
          "T.INFLUX": 3,
          "T.LOSSOF": 2,
          "T.MALICE": 3,
          "T.MISUSE": 3,
          "T.PRIVILEGE": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 10,
          "ADV_FSP": 1,
          "ADV_FSP.3": 12,
          "ADV_TDS": 1,
          "ADV_TDS.2": 13
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.3": 13,
          "ALC_CMS": 1,
          "ALC_CMS.3": 6,
          "ALC_DEL": 1,
          "ALC_DEL.1": 5,
          "ALC_DVS": 1,
          "ALC_DVS.1": 5,
          "ALC_FLR": 1,
          "ALC_FLR.2": 18,
          "ALC_LCD": 1,
          "ALC_LCD.1": 6
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 14,
          "ASE_ECD": 1,
          "ASE_ECD.1": 10,
          "ASE_INT": 1,
          "ASE_INT.1": 12,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 10,
          "ASE_REQ": 1,
          "ASE_REQ.2": 13,
          "ASE_SPD": 1,
          "ASE_SPD.1": 7,
          "ASE_TSS": 1,
          "ASE_TSS.1": 5
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 5,
          "ATE_DPT": 1,
          "ATE_DPT.1": 5,
          "ATE_FUN": 1,
          "ATE_FUN.1": 8,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.2": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 5,
          "EAL 3 augmented": 4,
          "EAL3": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_GEN.1": 13,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR": 5,
          "FAU_SAR.1": 12,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 6,
          "FAU_SAR.3.1": 1,
          "FAU_SEL": 2,
          "FAU_SEL.1": 6,
          "FAU_SEL.1.1": 1,
          "FAU_STG": 2,
          "FAU_STG.1": 2,
          "FAU_STG.2": 9,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.4": 7,
          "FAU_STG.4.1": 1
        },
        "FDP": {
          "FDP_IFC": 2,
          "FDP_IFC.1": 8,
          "FDP_IFC.1.1": 1,
          "FDP_IFF": 2,
          "FDP_IFF.1": 12,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 2,
          "FDP_IFF.1.5": 1
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 3,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 2,
          "FIA_SOS.1": 8,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 12,
          "FIA_UAU.2.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 3,
          "FIA_UID.2": 10,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.3": 2,
          "FMT_MTD": 1,
          "FMT_MTD.1": 14,
          "FMT_MTD.1.1": 6,
          "FMT_SMF": 2,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM": 3,
          "FPT_STM.1": 9,
          "FPT_STM.1.1": 1
        },
        "FTP": {
          "FTP_TRP": 2,
          "FTP_TRP.1": 7,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 9,
          "SSHv2": 7
        },
        "TLS": {
          "SSL": {
            "SSL": 5
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 2
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          },
          "RC": {
            "RC2": 2,
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2
          },
          "DES": {
            "DES": 2
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "D:20150318142909+08\u002700\u0027",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "D:20150318142917+08\u002700\u0027",
      "/Producer": "Foxit Reader PDF Printer Version 7.0.1.831",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 1322388,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 58
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055-CR-v1.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL3+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%201-0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "2c1c43a666a3fc88559e91db9cb80b213e0836113429e361bdc7000dad0854ec",
      "txt_hash": "9b9db6bb6759e1a61d0fe2f3841d0bc635a4fd7c09b9a1f95ade2be0ba083979"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "cff9a1bcdc3e242cb429e5ba2dc4677e32ff1fb42a98872beae7766c75d39e6f",
      "txt_hash": "5a2ae1ecd47b81bf3736e7072cc96dd7cab836c8116cea6aa28f2de9047f44fe"
    }
  },
  "status": "archived"
}