Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM) v6.9.1c
CSV information ?
Status | archived |
---|---|
Valid from | 14.12.2016 |
Valid until | 14.12.2021 |
Scheme | 🇲🇾 MY |
Manufacturer | Hewlett Packard Enterprise |
Category | Network and Network-Related Devices and Systems |
Security level | EAL2 |
Maintenance updates | Hewlett Packard Enterprise Security ArcSight ESM v6.11.0 (14.07.2017) Certification report Security target |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
TLS v1.0, TLS v1.1, TLS v1.2Security level
EAL2, EAL 2Security Assurance Requirements (SAR)
ATE_IND.2, AVA_VAN.2Security Functional Requirements (SFR)
FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_ATD.1.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_UAU.5.1, FIA_UAU.5.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FPT_ITT.1.1, FTA_SSL.4.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Certificates
ISCB-5-RPT-C076-CR-v1Evaluation facilities
LeidosStandards
FIPS 140-2, ISO/IEC15408, ISO/IEC 18045File metadata
Title | C076 Certification Report |
---|---|
Subject | Hewlett Packard Enterprise ArcSight ESM |
Keywords | MyCB_TMP_002 |
Author | ISCB Department |
Creation date | D:20161215113008+00'00' |
Modification date | D:20161215113008+00'00' |
Pages | 30 |
Creator | Microsoft Word |
Security target ?
Extracted keywords
Hash functions
SHA-256Protocols
TLS, TLS v1.0, TLS v1.1, TLS v1.2Libraries
NSSTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHASecurity level
EAL2, EAL 2Claims
O.ANALYZER, O.AUDIT, O.AUDIT_REVIEW, O.I_AND_A, O.PASSWORD_CONTROLS, O.PROTECTED, O.RESPONSE, O.REVIEW, O.SECURITY_MANAGEMENT, O.STORAGE, O.THROTTLE, O.PROTECTED_COMMS, T.BRUTE_FORCE, T.INTEGRITY_COMPROMISE, T.NETWORK_COMPROMISE, T.NO_ACCOUNTABILITY, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACTIVITY, T.UNDETECTED_THREATS, A.MANAGE, A.PLATFORM, A.PROTECT, OE.PERSONNEL, OE.PHYSICAL, OE.PLATFORM, OE.SENSORS, OE.TIMESecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_STG, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FCS_COP.1, FCS_COP.1.1, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF, FMT_MTD.1, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_ITT, FPT_ITT.1, FPT_ITT.1.1, FTA_SSL, FTA_SSL.4, FTA_SSL.4.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Standards
FIPS 140-2, RFC 2246, X.509File metadata
Title | HPE ArcSight ESM |
---|---|
Subject | Security Target |
Author | Apted, Tony J. [RA] |
Creation date | D:20161215092549+00'00' |
Modification date | D:20161215092549+00'00' |
Pages | 47 |
Creator | Microsoft Word |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2017-13986 | MEDIUM | 6.1 | 2.7 | 30.09.2017 01:29 | ||
CVE-2017-13987 | MEDIUM | 6.5 | 3.6 | 30.09.2017 01:29 | ||
CVE-2017-13988 | MEDIUM | 6.5 | 3.6 | 30.09.2017 01:29 | ||
CVE-2017-13989 | HIGH | 8.1 | 5.2 | 30.09.2017 01:29 | ||
CVE-2017-13990 | MEDIUM | 5.3 | 1.4 | 30.09.2017 01:29 | ||
CVE-2017-13991 | MEDIUM | 5.3 | 1.4 | 30.09.2017 01:29 | ||
CVE-2017-14356 | CRITICAL | 9.8 | 5.9 | 31.10.2017 15:29 | ||
CVE-2017-14357 | MEDIUM | 6.1 | 2.7 | 31.10.2017 15:29 | ||
CVE-2017-14358 | MEDIUM | 6.1 | 2.7 | 31.10.2017 15:29 |
Scheme data ?
Cert No | 2016-005-C076 | |
---|---|---|
Developer | Hewlett Packard Enterprise (HPE) | |
Level | EAL2 | |
Product | Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM) | |
Certification Date | 14.12.2016 | |
Expiration Date | 14.12.2021 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/110 | |
Enhanced | ||
Cert Id | C076 | |
Product | Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM) | |
Developer | Lee IvyEngineering Director, ArcSightHewlett Packard Enterprise Security Products [email protected]: 650-265-3457Mobile: 408-386-17001160 Enterprise Way (Moffett Towers Building G, 7th Floor),Sunnyvale CA 94089 | |
Category | Network and Network-Related Devices and Systems | |
Type | Security Information and Event Management (SIEM) | |
Scope | ArcSight ESM is a Security Information and Event Management (SIEM) solution that combines event correlation and security analytics to identify and prioritize threats in real time and remediate incidents early. It is able to concentrate, normalize, analyze, and report the results of its analysis of security event data generated by various Intrusion Detection System (IDS) sensors and scanners in the operational environment. ArcSight ESM provides authorized users with capabilities to monitor events, correlate events for in-depth investigation and analysis, and resolve events with automated escalation procedures and actions. The following security functions are implemented by the TOE: Security Audit Identification adn Authentication Security Management Protection of the TSF Trusted Path/Channels Intrusion Detection System | |
Assurance Level | EAL2 | |
Certification Date | 14.12.2016 | |
Expiration Date | 14.12.2021 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/HPE%20ArcSight%20ESM%20ST.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/ISCB-5-RPT-C076-CR-v1.pdf | |
Status | Archive |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2016-12-14', 'expiration_date': '2021-12-14', 'enhanced': {'__update__': {'developer': 'Lee IvyEngineering Director, ArcSightHewlett Packard Enterprise Security Products [email protected]: 650-265-3457Mobile: 408-386-17001160 Enterprise Way (Moffett Towers Building G, 7th Floor),Sunnyvale CA 94089', 'scope': 'ArcSight ESM is a Security Information and Event Management (SIEM) solution that combines event correlation and security analytics to identify and prioritize threats in real time and remediate incidents early. It is able to concentrate, normalize, analyze, and report the results of its analysis of security event data generated by various Intrusion Detection System (IDS) sensors and scanners in the operational environment. ArcSight ESM provides authorized users with capabilities to monitor events, correlate events for in-depth investigation and analysis, and resolve events with automated escalation procedures and actions. The following security functions are implemented by the TOE: Security Audit Identification adn Authentication Security Management Protection of the TSF Trusted Path/Channels Intrusion Detection System', 'certification_date': '2016-12-14', 'expiration_date': '2021-12-14'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'efc44b67939b752f107fc4c46aa92d9d4ee83907420664170320003f6a31032e', 'txt_hash': 'fe88684e17e81302cd244e9d4ebc021616f6bddcb914f03d96b1c0968140dc69'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3319d4f5fd90fbd992e904efd0282e0cf320504fe245995cca83bdbf7bd017d9', 'txt_hash': 'fa7c76b5c6980c2c363e9f8907f50cd13dfa49817b2a304c088e1303d328453e'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 788072, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 30, '/Title': 'C076 Certification Report', '/Author': 'ISCB Department', '/Subject': 'Hewlett Packard Enterprise ArcSight ESM', '/Keywords': 'MyCB_TMP_002', '/Creator': 'Microsoft Word', '/CreationDate': "D:20161215113008+00'00'", '/ModDate': "D:20161215113008+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cybersecurity.my/mycc', 'mailto:[email protected]', 'http://www.commoncriteriaportal.org/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1391138, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 47, '/Title': 'HPE ArcSight ESM', '/Author': 'Apted, Tony J. [RA]', '/Subject': 'Security Target', '/Creator': 'Microsoft Word', '/CreationDate': "D:20161215092549+00'00'", '/ModDate': "D:20161215092549+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-5-RPT-C076-CR-v1': 29}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 5, 'EAL 2': 3}}, 'cc_sar': {'ATE': {'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.2': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FIA': {'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1}, 'FMT': {'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_ITT.1.1': 1}, 'FTA': {'FTA_SSL.4.1': 2}, 'FTP': {'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Leidos': {'Leidos': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS v1.0': 1, 'TLS v1.1': 1, 'TLS v1.2': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 3}, 'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.2': 11, 'ADV_TDS.1': 11}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_CMC.2': 8, 'ALC_CMS.2': 6, 'ALC_DEL.1': 5}, 'ATE': {'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.2': 7}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 14, 'ASE_ECD.1': 10, 'ASE_INT.1': 12, 'ASE_OBJ.2': 10, 'ASE_REQ.2': 13, 'ASE_SPD.1': 7, 'ASE_TSS.1': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN': 3, 'FAU_SAR': 9, 'FAU_STG': 3, 'FAU_GEN.1': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1': 10, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 4, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 5, 'FAU_SAR.3.1': 1, 'FAU_STG.1': 4, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_COP.1': 2, 'FCS_COP.1.1': 1}, 'FIA': {'FIA_AFL': 3, 'FIA_ATD': 3, 'FIA_SOS': 3, 'FIA_UAU': 6, 'FIA_UID': 2, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU.1': 9, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 4, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 10, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF': 2, 'FMT_MTD.1': 8, 'FMT_SMF': 2, 'FMT_SMR': 2, 'FMT_MOF.1': 6, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 2, 'FMT_SMF.1': 9, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 7, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 3, 'FPT_ITT': 3, 'FPT_ITT.1': 5, 'FPT_ITT.1.1': 1}, 'FTA': {'FTA_SSL': 3, 'FTA_SSL.4': 5, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_ITC': 2, 'FTP_TRP': 3, 'FTP_ITC.1': 6, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 5, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ANALYZER': 7, 'O.AUDIT': 5, 'O.AUDIT_REVIEW': 4, 'O.I_AND_A': 4, 'O.PASSWORD_CONTROLS': 4, 'O.PROTECTED': 1, 'O.RESPONSE': 4, 'O.REVIEW': 3, 'O.SECURITY_MANAGEMENT': 4, 'O.STORAGE': 3, 'O.THROTTLE': 4, 'O.PROTECTED_COMMS': 2}, 'T': {'T.BRUTE_FORCE': 3, 'T.INTEGRITY_COMPROMISE': 2, 'T.NETWORK_COMPROMISE': 3, 'T.NO_ACCOUNTABILITY': 2, 'T.UNAUTHORIZED_ACCESS': 2, 'T.UNAUTHORIZED_ACTIVITY': 3, 'T.UNDETECTED_THREATS': 2}, 'A': {'A.MANAGE': 2, 'A.PLATFORM': 2, 'A.PROTECT': 3}, 'OE': {'OE.PERSONNEL': 2, 'OE.PHYSICAL': 2, 'OE.PLATFORM': 2, 'OE.SENSORS': 3, 'OE.TIME': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 6, 'TLS v1.0': 4, 'TLS v1.1': 4, 'TLS v1.2': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_3DES_EDE_CBC_SHA': 1, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 1}}, 'crypto_library': {'NSS': {'NSS': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 3}, 'RFC': {'RFC 2246': 1}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C076-CR-v1.pdf
. - The st_filename property was set to
HPE ArcSight ESM ST.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-5-RPT-C076-CR-v1
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C076-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HPE%20ArcSight%20ESM%20ST.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM) v6.9.1c was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "e77512aeb71ff153",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C076-CR-v1",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.9.1"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2017-14356",
"CVE-2017-13986",
"CVE-2017-13989",
"CVE-2017-13991",
"CVE-2017-14357",
"CVE-2017-13990",
"CVE-2017-14358",
"CVE-2017-13987",
"CVE-2017-13988"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2016-005-C076",
"certification_date": "2016-12-14",
"developer": "Hewlett Packard Enterprise (HPE)",
"enhanced": {
"assurance_level": "EAL2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C076",
"certification_date": "2016-12-14",
"developer": "Lee IvyEngineering Director, ArcSightHewlett Packard Enterprise Security Products [email protected]: 650-265-3457Mobile: 408-386-17001160 Enterprise Way (Moffett Towers Building G, 7th Floor),Sunnyvale CA 94089",
"expiration_date": "2021-12-14",
"mutual_recognition": "CCRA",
"product": "Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM)",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/ISCB-5-RPT-C076-CR-v1.pdf",
"scope": "ArcSight ESM is a Security Information and Event Management (SIEM) solution that combines event correlation and security analytics to identify and prioritize threats in real time and remediate incidents early. It is able to concentrate, normalize, analyze, and report the results of its analysis of security event data generated by various Intrusion Detection System (IDS) sensors and scanners in the operational environment. ArcSight ESM provides authorized users with capabilities to monitor events, correlate events for in-depth investigation and analysis, and resolve events with automated escalation procedures and actions. The following security functions are implemented by the TOE: Security Audit Identification adn Authentication Security Management Protection of the TSF Trusted Path/Channels Intrusion Detection System",
"status": "Archive",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/HPE%20ArcSight%20ESM%20ST.pdf",
"type": "Security Information and Event Management (SIEM)"
},
"expiration_date": "2021-12-14",
"level": "EAL2",
"product": "Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM)",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/110"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2017-07-14",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-FRM-M007-AMR-v1%20.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HPE%20ArcSight%20ESM%206.11.0_ST.pdf",
"maintenance_title": "Hewlett Packard Enterprise Security ArcSight ESM v6.11.0"
}
]
},
"manufacturer": "Hewlett Packard Enterprise",
"manufacturer_web": "https://www.hpe.com/",
"name": "Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM) v6.9.1c",
"not_valid_after": "2021-12-14",
"not_valid_before": "2016-12-14",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C076-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C076-CR-v1": 29
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ATE": {
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2.1": 1,
"FAU_SAR.3.1": 1,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FIA": {
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1.1": 1,
"FIA_SOS.1.1": 1,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1.1": 1,
"FMT_MTD.1.1": 2,
"FMT_SMF.1.1": 1,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT.1.1": 1
},
"FTA": {
"FTA_SSL.4.1": 2
},
"FTP": {
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS v1.0": 1,
"TLS v1.1": 1,
"TLS v1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Leidos": {
"Leidos": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 3
},
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ISCB Department",
"/CreationDate": "D:20161215113008+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/Keywords": "MyCB_TMP_002",
"/ModDate": "D:20161215113008+00\u002700\u0027",
"/Subject": "Hewlett Packard Enterprise ArcSight ESM",
"/Title": "C076 Certification Report",
"pdf_file_size_bytes": 788072,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.commoncriteriaportal.org/",
"http://www.cybersecurity.my/mycc"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 30
},
"st_filename": "HPE ArcSight ESM ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.MANAGE": 2,
"A.PLATFORM": 2,
"A.PROTECT": 3
},
"O": {
"O.ANALYZER": 7,
"O.AUDIT": 5,
"O.AUDIT_REVIEW": 4,
"O.I_AND_A": 4,
"O.PASSWORD_CONTROLS": 4,
"O.PROTECTED": 1,
"O.PROTECTED_COMMS": 2,
"O.RESPONSE": 4,
"O.REVIEW": 3,
"O.SECURITY_MANAGEMENT": 4,
"O.STORAGE": 3,
"O.THROTTLE": 4
},
"OE": {
"OE.PERSONNEL": 2,
"OE.PHYSICAL": 2,
"OE.PLATFORM": 2,
"OE.SENSORS": 3,
"OE.TIME": 3
},
"T": {
"T.BRUTE_FORCE": 3,
"T.INTEGRITY_COMPROMISE": 2,
"T.NETWORK_COMPROMISE": 3,
"T.NO_ACCOUNTABILITY": 2,
"T.UNAUTHORIZED_ACCESS": 2,
"T.UNAUTHORIZED_ACTIVITY": 3,
"T.UNDETECTED_THREATS": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 10,
"ADV_FSP": 1,
"ADV_FSP.2": 11,
"ADV_TDS": 1,
"ADV_TDS.1": 11
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.2": 8,
"ALC_CMS": 1,
"ALC_CMS.2": 6,
"ALC_DEL": 1,
"ALC_DEL.1": 5
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 14,
"ASE_ECD": 1,
"ASE_ECD.1": 10,
"ASE_INT": 1,
"ASE_INT.1": 12,
"ASE_OBJ": 1,
"ASE_OBJ.2": 10,
"ASE_REQ": 1,
"ASE_REQ.2": 13,
"ASE_SPD": 1,
"ASE_SPD.1": 7,
"ASE_TSS": 1,
"ASE_TSS.1": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 4,
"ATE_FUN": 1,
"ATE_FUN.1": 8,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 3,
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 9,
"FAU_SAR.1": 10,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 4,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1,
"FAU_STG": 3,
"FAU_STG.1": 4,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_COP.1": 2,
"FCS_COP.1.1": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 4,
"FIA_ATD.1.1": 1,
"FIA_SOS": 3,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU": 6,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 4,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID": 2,
"FIA_UID.1": 10,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 6,
"FMT_MOF.1.1": 1,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 2,
"FMT_SMF": 2,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT": 3,
"FPT_ITT.1": 5,
"FPT_ITT.1.1": 1,
"FPT_STM.1": 3
},
"FTA": {
"FTA_SSL": 3,
"FTA_SSL.4": 5,
"FTA_SSL.4.1": 1
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 6,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 3,
"FTP_TRP.1": 5,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"NSS": {
"NSS": 1
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 6,
"TLS v1.0": 4,
"TLS v1.1": 4,
"TLS v1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 3
},
"RFC": {
"RFC 2246": 1
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
"TLS_RSA_WITH_3DES_EDE_CBC_SHA": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA": 1
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Apted, Tony J. [RA]",
"/CreationDate": "D:20161215092549+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20161215092549+00\u002700\u0027",
"/Subject": "Security Target",
"/Title": "HPE ArcSight ESM",
"pdf_file_size_bytes": 1391138,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 47
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C076-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HPE%20ArcSight%20ESM%20ST.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "efc44b67939b752f107fc4c46aa92d9d4ee83907420664170320003f6a31032e",
"txt_hash": "fe88684e17e81302cd244e9d4ebc021616f6bddcb914f03d96b1c0968140dc69"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3319d4f5fd90fbd992e904efd0282e0cf320504fe245995cca83bdbf7bd017d9",
"txt_hash": "fa7c76b5c6980c2c363e9f8907f50cd13dfa49817b2a304c088e1303d328453e"
}
},
"status": "archived"
}