{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C122-CERTIFICATE-v1.pdf",
"dgst": "9557a2a073366fd5",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C122-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"21.1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2016-002-C068",
"certification_date": "2021-06-29",
"developer": "Sigma Rectrix Systems (M) Sdn. Bhd.",
"enhanced": {
"assurance_level": "EAL2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C068",
"certification_date": "2021-06-29",
"developer": "Suite 3-05, 4805 CBD Perdana 2Jalan Perdana Cyber 1263000 Cyberjaya Selangor Phone: +60383186696Email: [email protected]: https://sigmarectrix.com",
"expiration_date": "2026-06-29",
"mutual_recognition": "CCRA",
"product": "Garcinia Firewall Router v21.1.0",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/ISCB-5-RPT-C122-CR-v1.pdf",
"scope": "The TOE is a firewall and routing platform which is a self-contained appliance consisting of hardware and firmware. The TOE is a product that manages the network from any congestion and harm. The TOE analyse the incoming and outgoing network traffic, loss and manipulation of data, business secrets and confidential of data leaks. Firewall are indeed important and everyone who is online must strive to have a firewall protection before it\u2019s vulnerable to external and internal. The TOE core features include Traffic Shaper, Captive portal, Forward Caching Proxy, Virtual Private Network, High Availability \u0026 Hardware Failover, Intrusion Detection and Inline Prevention, Build-in reporting and monitoring tools, Support for plugins, DNS Server \u0026 DNS Forwarder, DHCP Server and Relay, Dynamic DNS, Backup \u0026 Restore, Stateful inspection firewall, Granular control over state table, 802.1Q VLAN support and many more.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/Garcinia_Security_Target_v10.pdf",
"type": "Network and Network-Related Devices and Systems"
},
"expiration_date": "2026-06-29",
"level": "EAL2",
"product": "Garcinia Firewall Router v21.1.0",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/105"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sigma Rectrix Systems (M) Sdn Bhd",
"manufacturer_web": "https://sigmarectrix.com/",
"name": "Garcinia Firewall Router v21.1.0",
"not_valid_after": "2026-06-29",
"not_valid_before": "2021-06-29",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C122-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20210702113323+08\u002700\u0027",
"/Creator": "ISCB Printer",
"/ModDate": "D:20210702114719+08\u002700\u0027",
"/Producer": "KONICA MINOLTA bizhub C360i",
"/Title": "SISCB Print21070211330",
"pdf_file_size_bytes": 83646,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-5-RPT-C122-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C122-CR-v1": 32
}
},
"cc_claims": {
"A": {
"A.NOEVIL": 1,
"A.PHYSEC": 1,
"A.SINGEN": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 5,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1
},
"FDP": {
"FDP_ACC.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_ATD.1": 1,
"FIA_UAU.2": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MTD.1": 1,
"FMT_SMF.1": 1
},
"FPT": {
"FPT_STM.1": 1
},
"FTP": {
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 1,
"TLS v1.2": 2,
"TLS v1.3": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210629084536Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20210629084536Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
"pdf_file_size_bytes": 909626,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 33
},
"st_filename": "Garcinia Security Target v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NOEVIL": 3,
"A.PHYSEC": 2,
"A.SINGEN": 3
},
"O": {
"O.ACCOUN": 4,
"O.AUDREC": 3,
"O.DATA_FLOW": 3,
"O.IDAUTH": 4,
"O.MEDIAT": 3,
"O.SECFUN": 4,
"O.SECSTA": 3,
"O.TOECOM": 4
},
"OE": {
"OE.ADMTRA": 3,
"OE.GUIDAN": 3,
"OE.PHYSEC": 2,
"OE.SINGEN": 3
},
"T": {
"T.AUDACC": 4,
"T.AUDFUL": 2,
"T.MEDIAT": 3,
"T.MISUSE": 2,
"T.NOAUTH": 2,
"T.OLDINF": 3,
"T.SELPRO": 3,
"T.TOECOM": 3,
"T.TUSAGE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 4,
"ASE_ECD.1": 1,
"ASE_INT.1": 4,
"ASE_OBJ.2": 4,
"ASE_REQ.2": 4,
"ASE_SPD.1": 4,
"ASE_TSS.1": 4
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 7
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 1,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FDP": {
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 7,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1,
"FDP_IFF": 2
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 7,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 5,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 15,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 7,
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_TRP.1": 6,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 2
},
"TLS": {
"TLS": {
"TLS v1.2": 3,
"TLS v1.3": 3
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
},
"STMicroelectronics": {
"STM": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Securelytics",
"/CreationDate": "D:20210620173631+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20210620173631+00\u002700\u0027",
"/Title": "Garcinia Security Target",
"pdf_file_size_bytes": 971230,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commonriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C122-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Garcinia%20Security%20Target%20v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "d25e4fbcd79ebddd0e58b7d7c330063739082765771db197237c3f751bdb4993",
"txt_hash": "031e6f720822be0a49e86b536a07e443e1cb19be9e592ca90436b2525997d791"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "78035505e5f8130b5824e6653081158a8b93eed277f303e9c8875b29a07a4209",
"txt_hash": "2d126b1ceee81fb85faeb10e4a2a4e796c579c6d40344f9c67bd90cfa7e36106"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "4a6944a16081259d071280c6a612aadf274edb77e7e1756bf6ce375a30e5a4ed",
"txt_hash": "5774a883851ddfc27594086a69c6e679f65b31ffa9911ead363b497b50af1094"
}
},
"status": "active"
}