This page was not yet optimized for use on mobile
devices.
Trend Micro TippingPoint Security Management System (SMS) v6.2.0
CSV information
| Status | active |
|---|---|
| Valid from | 03.05.2024 |
| Valid until | 03.05.2029 |
| Scheme | 🇲🇾 MY |
| Manufacturer | Trend Micro Incorporated. |
| Category | Network and Network-Related Devices and Systems |
| Security level | EAL2 |
| Maintenance updates | Trend Micro TippingPoint Security Management System (SMS) v6.3.0 (27.11.2024) Certification report Security target |
| Trend Micro TippingPoint Security Management System (SMS) v6.4.0 (25.06.2025) Certification report Security target | |
| Trend Micro TippingPoint Security Management System v6.5.0 (15.04.2026) Certification report Security target |
Heuristics summary
Certificate ID: ISCB-5-RPT-C133-CR-v1
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL2Certification report
Extracted keywords
Hash functions
SHA-256Protocols
SSH, SSL, TLSSecurity level
EAL 2Claims
A.MANAGE, A.PROTECTSecurity Functional Requirements (SFR)
FAU_GEN.1.1, FAU_GEN.1, FAU_SAR.1, FAU_SAR.3, FIA_AFL.1, FIA_SOS.1, FIA_UAU.5, FIA_UAU.7, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_MTD.1.1, FMT_SMR.1, FPT_ITT.1, FTA_MCS.1, FTA_SSL.1, FTA_TAB.1, FTP_ITC.1Certificates
ISCB-5-RPT-C133-CR-v1, ISCB-5-RPT-C133-CR-V1Evaluation facilities
LeidosStandards
ISO/IEC15408, ISO/IEC 18045File metadata
| Title | ISCB-5-RPT-C133-CR-v1 |
|---|---|
| Creation date | D:20240510051519Z00'00' |
| Modification date | D:20240510051519Z00'00' |
| Pages | 35 |
| Creator | Word |
| Producer | macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext |
Security target
Extracted keywords
Protocols
SSH, TLS, TLS v1.0, TLS v1.1, TLS v1.2, TLS 1.2Libraries
OpenSSLTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384Security level
EAL2, EAL 2Claims
O.AUDIT, O.AUDIT_REVIEW, O.I_AND_A, O.LOGIN_BANNER, O.LOGIN_HISTORY, O.PASSWORD_CONTROLS, O.PROTECTED, O.SECURITY_MANAGEMENT, O.SESSION_LIMITS, O.SESSION_SECURITY, O.STORAGE, O.THROTTLE, O.PROTECTED_COMMS, T.BRUTE_FORCE, T.INAPPRORIATE_USE, T.INTEGRITY_COMPROMISE, T.NETWORK_COMPROMISE, T.NO_ACCOUNTABILITY, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACTIVITY, A.MANAGE, A.PROTECT, OE.PERSONNEL, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FAU_GEN, FAU_SAR, FAU_STG, FCS_COP.1, FCS_COP.1.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UAU.6, FIA_UAU.7, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_UID.1, FIA_UAU.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FMT_SMR, FPT_ITT.1, FPT_STM.1, FPT_ITT.1.1, FPT_STM.1.1, FPT_ITT, FPT_STM, FTA_MCS.1, FTA_SSL.1, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_TAH.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTA_TAH.1.1, FTA_TAH.1.2, FTA_TAH.1.3, FTA_MCS, FTA_SSL, FTA_TAB, FTA_TAH, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC, FTP_TRPEvaluation facilities
LeidosFile metadata
| Title | Trend Micro SMS |
|---|---|
| Subject | Third Party Protected Information |
| Author | Apted, Tony J. [RA] |
| Creation date | D:20240403093836+08'00' |
| Modification date | D:20240403093836+08'00' |
| Pages | 45 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ISCB-5-RPT-C133-CR-v1Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Similar certificates
| Name | Certificate ID | |
|---|---|---|
| NATEK Security Information and Event Management SIEM GUI v2.0.2 with SIEM SERVER v6.2.0 and SIEM RECORDER v9.2.2 and ... | 21.0.03/TSE-CCCS-36 | Compare |
Scheme data
| Cert No | 2024-003-C133 | |
|---|---|---|
| Developer | Trend Micro Incorporated. | |
| Level | EAL2 | |
| Product | Trend Micro TippingPoint Security Management System (SMS) v6.2.0 | |
| Certification Date | 03.05.2024 | |
| Expiration Date | 03.05.2029 | |
| Recognition | CCRA | |
| Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/171 | |
| Enhanced | ||
| Developer | 11305 Alterra ParkwayAustin, TX 78758Phone: +1 (817) 569-8900Toll-free: (888) 762-8736https://www.trendmicro.com/en_za/contact.html | |
| Status | Valid | |
| Scope | The TOE provides centralized control for managing large-scale deployments of the following TippingPoint products: TippingPoint NX Series Next-Generation Intrusion Prevention System (IPS)—uses a combination of technologies, including deep packet inspection, threat reputation, and advanced malware analysis, on a flow-by-flow basis to detect and prevent attacks on the network. TippingPoint Threat Protection System (TPS)—a network security platform that offers comprehensive threat protection, shielding network vulnerabilities, blocking exploits, and defending against known and zero-day attacks. The TOE also provides capabilities for communicating threat data with TippingPoint Deep Discovery (DD) devices. TippingPoint DD is a threat protection platform providing capabilities to detect, analyze and respond to network-based attacks. | |
| Cert Id | C133 | |
| Category | Network and Network-Related Devices and Systems | |
| Assurance Level | EAL2 | |
| Product | Trend Micro TippingPoint Security Management System (SMS) v6.2.0 | |
| Certification Date | 03.05.2024 | |
| Expiration Date | 03.05.2029 | |
| Mutual Recognition | CCRA | |
| Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/Trend_Micro_SMS_6.2.0_ST-v1.0.pdf | |
| Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/ISCB-5-RPT-C133-CR-v1.pdf | |
| Type | Network and Network-Related Devices and Systems | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C133-CERTIFICATE-V1.pdf",
"dgst": "633dc7480c953157",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C133-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.2.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2024-003-C133",
"certification_date": "2024-05-03",
"developer": "Trend Micro Incorporated.",
"enhanced": {
"assurance_level": "EAL2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C133",
"certification_date": "2024-05-03",
"developer": "11305 Alterra ParkwayAustin, TX 78758Phone: +1 (817) 569-8900Toll-free: (888) 762-8736https://www.trendmicro.com/en_za/contact.html",
"expiration_date": "2029-05-03",
"mutual_recognition": "CCRA",
"product": "Trend Micro TippingPoint Security Management System (SMS) v6.2.0",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/ISCB-5-RPT-C133-CR-v1.pdf",
"scope": "The TOE provides centralized control for managing large-scale deployments of the following TippingPoint products: TippingPoint NX Series Next-Generation Intrusion Prevention System (IPS)\u2014uses a combination of technologies, including deep packet inspection, threat reputation, and advanced malware analysis, on a flow-by-flow basis to detect and prevent attacks on the network. TippingPoint Threat Protection System (TPS)\u2014a network security platform that offers comprehensive threat protection, shielding network vulnerabilities, blocking exploits, and defending against known and zero-day attacks. The TOE also provides capabilities for communicating threat data with TippingPoint Deep Discovery (DD) devices. TippingPoint DD is a threat protection platform providing capabilities to detect, analyze and respond to network-based attacks.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/Trend_Micro_SMS_6.2.0_ST-v1.0.pdf",
"type": "Network and Network-Related Devices and Systems"
},
"expiration_date": "2029-05-03",
"level": "EAL2",
"product": "Trend Micro TippingPoint Security Management System (SMS) v6.2.0",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/171"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2026-04-15",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M023-AMR-V1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trend%20Micro%20SMS%206.5.0%20ST%20v1.3.pdf",
"maintenance_title": "Trend Micro TippingPoint Security Management System v6.5.0"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2025-06-25",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M022-AMR-v1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trend%20Micro%20SMS%206.4.0%20ST%20v1.2.pdf",
"maintenance_title": "Trend Micro TippingPoint Security Management System (SMS) v6.4.0"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2024-11-27",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M021-AMR-v1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trend%20Micro%20SMS%206.3%20ST-v1.0.pdf",
"maintenance_title": "Trend Micro TippingPoint Security Management System (SMS) v6.3.0"
}
]
},
"manufacturer": "Trend Micro Incorporated.",
"manufacturer_web": "https://www.trendmicro.com",
"name": "Trend Micro TippingPoint Security Management System (SMS) v6.2.0",
"not_valid_after": "2029-05-03",
"not_valid_before": "2024-05-03",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "ISCB-5-CERT-C133-CERTIFICATE-V1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C133-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C133-CR-V1": 33,
"ISCB-5-RPT-C133-CR-v1": 2
}
},
"cc_claims": {
"A": {
"A.MANAGE": 1,
"A.PROTECT": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_GEN.1.1": 1,
"FAU_SAR.1": 1,
"FAU_SAR.3": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_SOS.1": 1,
"FIA_UAU.5": 1,
"FIA_UAU.7": 1
},
"FMT": {
"FMT_MOF.1": 3,
"FMT_MOF.1.1": 3,
"FMT_MTD.1": 6,
"FMT_MTD.1.1": 3,
"FMT_SMF.1": 1,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_ITT.1": 1
},
"FTA": {
"FTA_MCS.1": 1,
"FTA_SSL.1": 1,
"FTA_TAB.1": 1
},
"FTP": {
"FTP_ITC.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 5
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Leidos": {
"Leidos": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20240510051519Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20240510051519Z00\u002700\u0027",
"/Producer": "macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext",
"/Title": "ISCB-5-RPT-C133-CR-v1",
"pdf_file_size_bytes": 1537825,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 35
},
"st_filename": "Trend Micro SMS 6.2.0 ST-v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.MANAGE": 2,
"A.PROTECT": 3
},
"O": {
"O.AUDIT": 6,
"O.AUDIT_REVIEW": 3,
"O.I_AND_A": 8,
"O.LOGIN_BANNER": 3,
"O.LOGIN_HISTORY": 5,
"O.PASSWORD_CONTROLS": 3,
"O.PROTECTED": 1,
"O.PROTECTED_COMMS": 4,
"O.SECURITY_MANAGEMENT": 3,
"O.SESSION_LIMITS": 5,
"O.SESSION_SECURITY": 3,
"O.STORAGE": 5,
"O.THROTTLE": 3
},
"OE": {
"OE.PERSONNEL": 2,
"OE.PHYSICAL": 2
},
"T": {
"T.BRUTE_FORCE": 3,
"T.INAPPRORIATE_USE": 2,
"T.INTEGRITY_COMPROMISE": 3,
"T.NETWORK_COMPROMISE": 2,
"T.NO_ACCOUNTABILITY": 3,
"T.UNAUTHORIZED_ACCESS": 2,
"T.UNAUTHORIZED_ACTIVITY": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 11,
"ADV_FSP.2": 12,
"ADV_TDS.1": 12
},
"AGD": {
"AGD_OPE.1": 11,
"AGD_PRE.1": 7
},
"ALC": {
"ALC_CMC.2": 9,
"ALC_CMS.2": 7,
"ALC_DEL.1": 6
},
"ASE": {
"ASE_CCL.1": 15,
"ASE_ECD.1": 11,
"ASE_INT.1": 13,
"ASE_OBJ.2": 11,
"ASE_REQ.2": 14,
"ASE_SPD.1": 8,
"ASE_TSS.1": 6
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 9,
"ATE_IND.2": 8
},
"AVA": {
"AVA_VAN.2": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_SAR": 6,
"FAU_SAR.1": 11,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 5,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 6,
"FAU_SAR.3.1": 1,
"FAU_STG": 2,
"FAU_STG.1": 5,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_COP.1": 2,
"FCS_COP.1.1": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 2,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS": 2,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU": 8,
"FIA_UAU.1": 4,
"FIA_UAU.2": 12,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 6,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 6,
"FIA_UAU.7.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 7,
"FIA_UID.2": 10,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 12,
"FMT_MOF.1.1": 3,
"FMT_MTD.1": 17,
"FMT_MTD.1.1": 6,
"FMT_SMF": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 9,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT": 2,
"FPT_ITT.1": 6,
"FPT_ITT.1.1": 1,
"FPT_STM": 3,
"FPT_STM.1": 8,
"FPT_STM.1.1": 1
},
"FTA": {
"FTA_MCS": 2,
"FTA_MCS.1": 6,
"FTA_MCS.1.1": 1,
"FTA_MCS.1.2": 1,
"FTA_SSL": 6,
"FTA_SSL.1": 6,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 1,
"FTA_SSL.3": 7,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 6,
"FTA_SSL.4.1": 1,
"FTA_TAB": 2,
"FTA_TAB.1": 6,
"FTA_TAB.1.1": 1,
"FTA_TAH": 2,
"FTA_TAH.1": 6,
"FTA_TAH.1.1": 1,
"FTA_TAH.1.2": 1,
"FTA_TAH.1.3": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 2,
"FTP_TRP.1": 6,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"SSH": {
"SSH": 11
},
"TLS": {
"TLS": {
"TLS": 12,
"TLS 1.2": 1,
"TLS v1.0": 2,
"TLS v1.1": 2,
"TLS v1.2": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Leidos": {
"Leidos": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Apted, Tony J. [RA]",
"/CreationDate": "D:20240403093836+08\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20240403093836+08\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "Third Party Protected Information",
"/Title": "Trend Micro SMS",
"pdf_file_size_bytes": 852877,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 45
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C133-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trend%20Micro%20SMS%206.2.0%20ST-v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "ac2b74082dd4ca28aa03536ae6ff24472d2953196983dcf78c6f160fcff3de6a",
"txt_hash": "44f04b926ca10e0766d90306ddf222e7fac78e62749d0b1f443330e84ae111b3"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "f9ad8a25f9398487334c59f7985bbdd10dc37792e14fcb48eae5bc32f21a95a7",
"txt_hash": "e2552e17441e827de8d4197ec990ebc1dbb4d36a78b25eb07521aa3c884237f9"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "1bf538a0e22754ad91a375398c944f597173a506e382ed289a1eaf9b330ac0a4",
"txt_hash": "6523a46360a61707534c0baebabbd0900b11dd0f0f4890777a41c034375c05d9"
}
},
"status": "active"
}