Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 17.05.2022
Valid until 17.05.2027
Scheme 🇲🇾 MY
Manufacturer RSA Security LLC
Category Other Devices and Systems
Security level EAL2+, ALC_FLR.2
Maintenance updates Archer Suite v6.11 with the Archer IRM Mobile V1.4 (02.03.2023) Certification report Security target

Heuristics summary ?

Certificate ID: ISCB-5-RPT-C124-CR-v1

Certificate ?

Extracted keywords

Security Assurance Requirements (SAR)
ALC_FLR.2

File metadata

Title ISCB-5-CERT-C124-CERTIFICATE-v1
Creation date D:20220522024333Z00'00'
Modification date D:20220522024333Z00'00'
Pages 1
Creator Word
Producer macOS Version 11.6 (Build 20G165) Quartz PDFContext

Certification report ?

Extracted keywords

Protocols
SSL

Vendor
Microsoft

Security level
EAL 2
Claims
A.MANAGE, A.PROTECT, A.SECURE_COMMS, A.TIME, A.CRYPTO
Security Assurance Requirements (SAR)
ALC_FLR.2
Security Functional Requirements (SFR)
FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FDP_ACC.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.1, FDP_ACF.1.4, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.2, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMR.1.1, FTA_SSL.4.1, FTA_TAB.1.1, FTA_SSL.3.1, FTA_TSE.1.1
Certificates
ISCB-5-RPT-C124-CR-v1
Evaluation facilities
Leidos

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Title ISCB-5-RPT-C124-CR-v1
Creation date D:20220522032040Z00'00'
Modification date D:20220522032040Z00'00'
Pages 40
Creator Word
Producer macOS Version 11.6 (Build 20G165) Quartz PDFContext

Security target ?

Extracted keywords

Protocols
SSL

Vendor
Microsoft

Security level
EAL2, EAL 2, EAL 2 augmented
Claims
O.ACCESS_CONTROL, O.AUDIT, O.AUDIT_REVIEW, O.I_AND_A, O.LOGON_BANNER, O.PASSWORD_CONTROLS, O.SECURITY_MANAGEMENT, O.SESSION_LIMITATION, O.SESSION_TERMINATION, O.THROTTLE, T.BRUTE_FORCE, T.DATA_COMPROMISE, T.INAPPROPRIATE_USE, T.NO_ACCOUNTABILITY, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACTIVITY, T.INAPPRORIATE_USE, A.MANAGE, A.PROTECT, A.SECURE_COMMS, A.TIME, A.CRYPTO, OE.PHYSICAL, OE.PERSONNEL, OE.SECURE_COMMS, OE.TIME, OE.CRYPTO
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MOF, FMT_MSA, FMT_MTD.1, FMT_REV, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_SSL, FTA_TAB, FTA_TSE, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL.4, FTA_SSL.4.1, FTA_TAB.1, FTA_TAB.1.1, FTA_TSE.1, FTA_TSE.1.1

Standards
FIPS 140-2

File metadata

Title RSA Archer 6.9.1_ST_v1.0-final
Creation date D:20220522032525Z00'00'
Modification date D:20220522032525Z00'00'
Pages 45
Creator Word
Producer macOS Version 11.6 (Build 20G165) Quartz PDFContext

Heuristics ?

Certificate ID: ISCB-5-RPT-C124-CR-v1

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2020-26884
C M N
MEDIUM 6.1 2.7 18.11.2020 16:15
CVE-2020-29535
C M N
MEDIUM 5.4 2.7 29.01.2021 07:15
CVE-2020-29538
C M N
MEDIUM 4.9 3.6 29.01.2021 07:15
CVE-2021-29252
C M N
MEDIUM 5.4 2.7 26.05.2021 04:15
CVE-2021-29253
C M N
MEDIUM 5.5 3.6 26.05.2021 04:15
CVE-2021-33615
C M N
HIGH 7.5 5.9 02.06.2022 14:15
CVE-2021-33616
C M N
MEDIUM 5.4 2.7 04.04.2022 12:15
CVE-2021-38362
C M N
MEDIUM 6.5 3.6 30.03.2022 22:15
CVE-2021-41594
C M N
MEDIUM 6.5 3.6 30.03.2022 00:15
CVE-2022-26947
C M N
MEDIUM 5.4 2.7 30.03.2022 00:15
CVE-2022-26948
C M N
HIGH 7.5 3.6 30.03.2022 00:15
CVE-2022-26949
C M N
MEDIUM 6.5 3.6 30.03.2022 00:15
CVE-2022-26950
C M N
MEDIUM 6.1 2.7 30.03.2022 00:15
CVE-2022-26951
C M N
MEDIUM 6.1 2.7 30.03.2022 00:15
CVE-2022-30584
C M N
HIGH 8.8 5.9 26.05.2022 20:15
CVE-2022-30585
C M N
MEDIUM 6.5 3.6 26.05.2022 20:15
CVE-2022-37316
C M N
MEDIUM 6.5 3.6 25.08.2022 23:15
CVE-2022-37317
C M N
MEDIUM 5.4 2.7 25.08.2022 23:15
Showing 5 out of 18.

Scheme data ?

Cert No 2022-002-C124
Developer RSA Security LLC
Level EAL2+ ALC_FLR.2
Product Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
Certification Date 17.05.2022
Expiration Date 17.05.2027
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/128
Enhanced
Cert Id C124
Product Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
Developer RSA 13200 Metcalf Avenue, Suite 300 Overland Park, Kansas 66213, The United States of America
Category Other Devices and Systems
Type Other Devices and Systems
Scope Users access the TOE via a web-based graphical user interface (GUI) or via the TOEs Mobile application. The RSA Archer Mobile application provides remote users the ability to complete their Advanced Workflow actions (edit records and add comments) on-the-go. The TOE supports business-level management of governance, risk management, and compliance (GRC). It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. There are five main components to an RSA Archer Suite installation which are Web Application, Services, Instance Database, Configuration Database and Archer IRM Mobile or RSA Archer Mobile App.
Assurance Level EAL2+ ALC_FLR.2
Certification Date 17.05.2022
Expiration Date 17.05.2027
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/Archer_Suite_v6912_with_the_Archer_IRM_Mobile_V14__ST_v10-final.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/ISCB-5-RPT-C124-CR-v1.pdf
Status Valid

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2022-05-17', 'expiration_date': '2027-05-17', 'enhanced': {'__update__': {'developer': 'RSA 13200 Metcalf Avenue, Suite 300 Overland Park, Kansas 66213, The United States of America', 'scope': 'Users access the TOE via a web-based graphical user interface (GUI) or via the TOEs Mobile application. The RSA Archer Mobile application provides remote users the ability to complete their Advanced Workflow actions (edit records and add comments) on-the-go. The TOE supports business-level management of governance, risk management, and compliance (GRC). It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. There are five main components to an RSA Archer Suite installation which are Web Application, Services, Instance Database, Configuration Database and Archer IRM Mobile or RSA Archer Mobile App.', 'certification_date': '2022-05-17', 'expiration_date': '2027-05-17'}}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '02cbc4f91ccc98f97a590b2a06aaaf1a8c8030bd7e5dcd3a0ac2db85c5c2cd82', 'txt_hash': '158d154df2592e9660ab421614abd12b7ab7a555eb58f8f311f14f4dc85dbed2'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'db7526965cda03c5bab505621d570354d427a22da45c412a5c2bc857eb8ebd03', 'txt_hash': '19958e4d742077e5d26b0acbef7c8c0c6efb7f77405dd4fd33587a46760115b0'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4e8ff25f020ab4dc3fefe0b9bd2a1dc594d98aaa60918a7a0c8f123f66590080', 'txt_hash': '35a7442933749f2fb6637596ae4fd50fda7324403b78f5247cb6b3e1437212af'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1221299, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 40, '/CreationDate': "D:20220522032040Z00'00'", '/Creator': 'Word', '/ModDate': "D:20220522032040Z00'00'", '/Producer': 'macOS Version 11.6 (Build 20G165) Quartz PDFContext', '/Title': 'ISCB-5-RPT-C124-CR-v1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1012560, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 45, '/Title': 'RSA Archer 6.9.1_ST_v1.0-final', '/Producer': 'macOS Version 11.6 (Build 20G165) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20220522032525Z00'00'", '/ModDate': "D:20220522032525Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 808672, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 1, '/CreationDate': "D:20220522024333Z00'00'", '/Creator': 'Word', '/ModDate': "D:20220522024333Z00'00'", '/Producer': 'macOS Version 11.6 (Build 20G165) Quartz PDFContext', '/Title': 'ISCB-5-CERT-C124-CERTIFICATE-v1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C124-CR-v1': 39}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 5}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 8}}, 'cc_sfr': {'FAU': {'FAU_GEN.1.1': 7, 'FAU_GEN.1.2': 7, 'FAU_GEN.2.1': 6, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 7, 'FIA_UAU.5.1': 7, 'FIA_UAU.5.2': 7, 'FIA_UID.2.1': 6, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_UAU.6.1': 2}, 'FMT': {'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 3, 'FMT_SMR.1.2': 2, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 4, 'FMT_REV.1.1': 1, 'FMT_REV.1.2': 1, 'FMT_SMR.1.1': 1}, 'FTA': {'FTA_SSL.4.1': 5, 'FTA_TAB.1.1': 1, 'FTA_SSL.3.1': 2, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'A': {'A.MANAGE': 1, 'A.PROTECT': 1, 'A.SECURE_COMMS': 1, 'A.TIME': 1, 'A.CRYPTO': 1}}, 'vendor': {'Microsoft': {'Microsoft': 8}}, 'eval_facility': {'Leidos': {'Leidos': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 3, 'EAL 2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.2': 11, 'ADV_TDS.1': 11}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 16, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_FLR': 1, 'ALC_CMC.2': 8, 'ALC_CMS.2': 6, 'ALC_DEL.1': 5}, 'ATE': {'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.2': 7}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 14, 'ASE_ECD.1': 10, 'ASE_INT.1': 12, 'ASE_OBJ.2': 10, 'ASE_REQ.2': 13, 'ASE_SPD.1': 7, 'ASE_TSS.1': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN': 6, 'FAU_SAR': 9, 'FAU_GEN.1': 10, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_SAR.1': 9, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 4, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 5, 'FAU_SAR.3.1': 1}, 'FCS': {'FCS_COP.1': 2, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC': 1, 'FDP_ACF': 3, 'FDP_ACC.1': 11, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 5, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL': 3, 'FIA_ATD': 3, 'FIA_SOS': 3, 'FIA_UAU': 7, 'FIA_UID': 2, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU.2': 9, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 5, 'FIA_UAU.6.1': 1, 'FIA_UID.2': 9, 'FIA_UID.2.1': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 1}, 'FMT': {'FMT_MOF': 1, 'FMT_MSA': 5, 'FMT_MTD.1': 10, 'FMT_REV': 3, 'FMT_SMF': 2, 'FMT_SMR': 2, 'FMT_MOF.1': 7, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 2, 'FMT_REV.1': 4, 'FMT_REV.1.1': 1, 'FMT_REV.1.2': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 12, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 2}, 'FTA': {'FTA_SSL': 6, 'FTA_TAB': 3, 'FTA_TSE': 3, 'FTA_SSL.3': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL.4': 5, 'FTA_SSL.4.1': 1, 'FTA_TAB.1': 5, 'FTA_TAB.1.1': 1, 'FTA_TSE.1': 4, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 4, 'O.AUDIT': 4, 'O.AUDIT_REVIEW': 4, 'O.I_AND_A': 3, 'O.LOGON_BANNER': 4, 'O.PASSWORD_CONTROLS': 3, 'O.SECURITY_MANAGEMENT': 4, 'O.SESSION_LIMITATION': 3, 'O.SESSION_TERMINATION': 4, 'O.THROTTLE': 3}, 'T': {'T.BRUTE_FORCE': 3, 'T.DATA_COMPROMISE': 2, 'T.INAPPROPRIATE_USE': 2, 'T.NO_ACCOUNTABILITY': 2, 'T.UNATTENDED_SESSION': 3, 'T.UNAUTHORIZED_ACCESS': 2, 'T.UNAUTHORIZED_ACTIVITY': 3, 'T.INAPPRORIATE_USE': 1}, 'A': {'A.MANAGE': 2, 'A.PROTECT': 2, 'A.SECURE_COMMS': 3, 'A.TIME': 2, 'A.CRYPTO': 3}, 'OE': {'OE.PHYSICAL': 2, 'OE.PERSONNEL': 2, 'OE.SECURE_COMMS': 2, 'OE.TIME': 3, 'OE.CRYPTO': 3}}, 'vendor': {'Microsoft': {'Microsoft': 11}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ISCB-5-RPT-C124-CR-v1.pdf.
    • The st_filename property was set to Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 _ST_v1.0-final.pdf.
    • The cert_filename property was set to ISCB-5-CERT-C124-CERTIFICATE-v1.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-5-RPT-C124-CR-v1.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C124-CR-v1.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Archer%20Suite%20v6.9.1.2%20with%20the%20Archer%20IRM%20Mobile%20V1.4%20_ST_v1.0-final.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C124-CERTIFICATE-v1.pdf",
  "dgst": "0f38dd1ae9d80dfa",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C124-CR-v1",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:rsa:archer:6.9:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.4",
        "6.9.1.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2022-26950",
        "CVE-2020-29535",
        "CVE-2022-26947",
        "CVE-2022-30584",
        "CVE-2021-33615",
        "CVE-2022-26948",
        "CVE-2022-26949",
        "CVE-2022-30585",
        "CVE-2020-29538",
        "CVE-2022-37317",
        "CVE-2022-37316",
        "CVE-2021-41594",
        "CVE-2020-26884",
        "CVE-2021-29253",
        "CVE-2021-33616",
        "CVE-2022-26951",
        "CVE-2021-38362",
        "CVE-2021-29252"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2022-002-C124",
      "certification_date": "2022-05-17",
      "developer": "RSA Security LLC",
      "enhanced": {
        "assurance_level": "EAL2+ ALC_FLR.2",
        "category": "Other Devices and Systems",
        "cert_id": "C124",
        "certification_date": "2022-05-17",
        "developer": "RSA 13200 Metcalf Avenue, Suite 300 Overland Park, Kansas 66213, The United States of America",
        "expiration_date": "2027-05-17",
        "mutual_recognition": "CCRA",
        "product": "Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/ISCB-5-RPT-C124-CR-v1.pdf",
        "scope": "Users access the TOE via a web-based graphical user interface (GUI) or via the TOEs Mobile application. The RSA Archer Mobile application provides remote users the ability to complete their Advanced Workflow actions (edit records and add comments) on-the-go. The TOE supports business-level management of governance, risk management, and compliance (GRC). It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. There are five main components to an RSA Archer Suite installation which are Web Application, Services, Instance Database, Configuration Database and Archer IRM Mobile or RSA Archer Mobile App.",
        "status": "Valid",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/Archer_Suite_v6912_with_the_Archer_IRM_Mobile_V14__ST_v10-final.pdf",
        "type": "Other Devices and Systems"
      },
      "expiration_date": "2027-05-17",
      "level": "EAL2+ ALC_FLR.2",
      "product": "Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/128"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2023-03-02",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M019-AMR-v1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%206.11.0.3%20ST%20v1.0.pdf",
        "maintenance_title": "Archer Suite v6.11 with the Archer IRM Mobile V1.4"
      }
    ]
  },
  "manufacturer": "RSA Security LLC",
  "manufacturer_web": "https://rsa.com",
  "name": "Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4",
  "not_valid_after": "2027-05-17",
  "not_valid_before": "2022-05-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ISCB-5-CERT-C124-CERTIFICATE-v1.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20220522024333Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20220522024333Z00\u002700\u0027",
      "/Producer": "macOS Version 11.6 (Build 20G165) Quartz PDFContext",
      "/Title": "ISCB-5-CERT-C124-CERTIFICATE-v1",
      "pdf_file_size_bytes": 808672,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 1
    },
    "report_filename": "ISCB-5-RPT-C124-CR-v1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C124-CR-v1": 39
        }
      },
      "cc_claims": {
        "A": {
          "A.CRYPTO": 1,
          "A.MANAGE": 1,
          "A.PROTECT": 1,
          "A.SECURE_COMMS": 1,
          "A.TIME": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 5
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1.1": 7,
          "FAU_GEN.1.2": 7,
          "FAU_GEN.2.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3.1": 1
        },
        "FDP": {
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 1
        },
        "FIA": {
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.2.1": 7,
          "FIA_UAU.5.1": 7,
          "FIA_UAU.5.2": 7,
          "FIA_UAU.6.1": 2,
          "FIA_UID.2.1": 6
        },
        "FMT": {
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1.1": 4,
          "FMT_REV.1.1": 1,
          "FMT_REV.1.2": 1,
          "FMT_SMF.1.1": 3,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 2
        },
        "FTA": {
          "FTA_SSL.3.1": 2,
          "FTA_SSL.4.1": 5,
          "FTA_TAB.1.1": 1,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 8
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20220522032040Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20220522032040Z00\u002700\u0027",
      "/Producer": "macOS Version 11.6 (Build 20G165) Quartz PDFContext",
      "/Title": "ISCB-5-RPT-C124-CR-v1",
      "pdf_file_size_bytes": 1221299,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 40
    },
    "st_filename": "Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 _ST_v1.0-final.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CRYPTO": 3,
          "A.MANAGE": 2,
          "A.PROTECT": 2,
          "A.SECURE_COMMS": 3,
          "A.TIME": 2
        },
        "O": {
          "O.ACCESS_CONTROL": 4,
          "O.AUDIT": 4,
          "O.AUDIT_REVIEW": 4,
          "O.I_AND_A": 3,
          "O.LOGON_BANNER": 4,
          "O.PASSWORD_CONTROLS": 3,
          "O.SECURITY_MANAGEMENT": 4,
          "O.SESSION_LIMITATION": 3,
          "O.SESSION_TERMINATION": 4,
          "O.THROTTLE": 3
        },
        "OE": {
          "OE.CRYPTO": 3,
          "OE.PERSONNEL": 2,
          "OE.PHYSICAL": 2,
          "OE.SECURE_COMMS": 2,
          "OE.TIME": 3
        },
        "T": {
          "T.BRUTE_FORCE": 3,
          "T.DATA_COMPROMISE": 2,
          "T.INAPPROPRIATE_USE": 2,
          "T.INAPPRORIATE_USE": 1,
          "T.NO_ACCOUNTABILITY": 2,
          "T.UNATTENDED_SESSION": 3,
          "T.UNAUTHORIZED_ACCESS": 2,
          "T.UNAUTHORIZED_ACTIVITY": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 10,
          "ADV_FSP": 1,
          "ADV_FSP.2": 11,
          "ADV_TDS": 1,
          "ADV_TDS.1": 11
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.2": 8,
          "ALC_CMS": 1,
          "ALC_CMS.2": 6,
          "ALC_DEL": 1,
          "ALC_DEL.1": 5,
          "ALC_FLR": 1,
          "ALC_FLR.2": 16
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 14,
          "ASE_ECD": 1,
          "ASE_ECD.1": 10,
          "ASE_INT": 1,
          "ASE_INT.1": 12,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 10,
          "ASE_REQ": 1,
          "ASE_REQ.2": 13,
          "ASE_SPD": 1,
          "ASE_SPD.1": 7,
          "ASE_TSS": 1,
          "ASE_TSS.1": 5
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 4,
          "ATE_FUN": 1,
          "ATE_FUN.1": 8,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.2": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3,
          "EAL 2 augmented": 2,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 6,
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_SAR": 9,
          "FAU_SAR.1": 9,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 4,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 5,
          "FAU_SAR.3.1": 1
        },
        "FCS": {
          "FCS_COP.1": 2,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 11,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 3,
          "FDP_ACF.1": 5,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 1
        },
        "FIA": {
          "FIA_AFL": 3,
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 3,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 3,
          "FIA_SOS.1": 5,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 7,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 9,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 5,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 5,
          "FIA_UID.2": 9,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 5,
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 6,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 2,
          "FMT_REV": 3,
          "FMT_REV.1": 4,
          "FMT_REV.1.1": 1,
          "FMT_REV.1.2": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 2
        },
        "FTA": {
          "FTA_SSL": 6,
          "FTA_SSL.3": 5,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 5,
          "FTA_SSL.4.1": 1,
          "FTA_TAB": 3,
          "FTA_TAB.1": 5,
          "FTA_TAB.1.1": 1,
          "FTA_TSE": 3,
          "FTA_TSE.1": 4,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 11
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20220522032525Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20220522032525Z00\u002700\u0027",
      "/Producer": "macOS Version 11.6 (Build 20G165) Quartz PDFContext",
      "/Title": "RSA Archer 6.9.1_ST_v1.0-final",
      "pdf_file_size_bytes": 1012560,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 45
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C124-CR-v1.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Archer%20Suite%20v6.9.1.2%20with%20the%20Archer%20IRM%20Mobile%20V1.4%20_ST_v1.0-final.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4e8ff25f020ab4dc3fefe0b9bd2a1dc594d98aaa60918a7a0c8f123f66590080",
      "txt_hash": "35a7442933749f2fb6637596ae4fd50fda7324403b78f5247cb6b3e1437212af"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "02cbc4f91ccc98f97a590b2a06aaaf1a8c8030bd7e5dcd3a0ac2db85c5c2cd82",
      "txt_hash": "158d154df2592e9660ab421614abd12b7ab7a555eb58f8f311f14f4dc85dbed2"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "db7526965cda03c5bab505621d570354d427a22da45c412a5c2bc857eb8ebd03",
      "txt_hash": "19958e4d742077e5d26b0acbef7c8c0c6efb7f77405dd4fd33587a46760115b0"
    }
  },
  "status": "active"
}