Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
CSV information ?
Status | archived |
---|---|
Valid from | 24.12.2008 |
Valid until | 08.04.2014 |
Scheme | 🇯🇵 JP |
Manufacturer | Hitachi, Ltd. |
Category | Access Control Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSLVendor
CiscoSecurity level
EAL2Claims
T.ILLEGAL_XCNTL, T.TSF_COMP, T.LP_LEAK, T.CHG_CONFIG, A.NOEVIL, A.NOEVIL_MNT, A.PHYSICAL_SEC, A.ILLEGAL_SOFT, A.CONNECT_STORAGECertificates
CRP-C0200-01, Certification No. C0200Standards
ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Title | untitled |
---|---|
Creation date | D:20090401163719+09'00' |
Modification date | D:20090401163719+09'00' |
Pages | 24 |
Producer | Acrobat Distiller 6.0 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, 3DESAsymmetric Algorithms
RSA 512, DH, DSAHash functions
SHA-1Protocols
SSLv3.0, SSL, TLSv1.0, TLSVendor
Microsoft, Microsoft CorporationSecurity level
EAL 2, EAL2Claims
O.ADM_AUTH, O.ADM_ROLE, O.SEC_COMM, O.HOST_AUTH, O.HOST_ACCESS, O.AUD_GEN, T.ILLEGAL_XCNTL, T.TSF_COMP, T.LP_LEAK, T.CHG_CONFIG, A.NOEVIL, A.NOEVIL_MNT, A.PHYSICAL_SEC, A.ILLEGAL_SOFT, A.CONNECT_STORAGE, OE.NOEVIL, OE.NOEVIL-MNT, OE.PHYSICAL_SEC, OE.ILLEGAL_SOFT, OE.CONNECT_STORAGE, OE.NOEVIL_MNTSecurity Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FDP_ACC.1, FDP_IFC.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_ATD, FIA_ATD.1, FIA_USB, FIA_USB.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_SOS, FIA_SOS.1, FIA_UAU.2, FIA_UID.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2, FIA_MSA.1.1, FIA_MSA.3.1, FIA_MSA.3.2, FIA_UAU.5, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_MOF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.2, FMT_MOF.1.1, FPT_STM.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2Standards
FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-2, PKCS#1, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003File metadata
Title | USP_V ST |
---|---|
Subject | CC EAL2 Security Target |
Author | 八木 |
Creation date | D:20090330094022+09'00' |
Modification date | D:20090330094033+09'00' |
Pages | 93 |
Creator | Word 用 Acrobat PDFMaker 7.0.7 |
Producer | Acrobat Distiller 7.0.5 (Windows) |
Heuristics ?
Extracted SARs
ADV_FSP.1, AVA_SOF.1, AGD_ADM.1, AVA_VLA.1, ATE_COV.1, ATE_FUN.1, ADV_RCR.1, AGD_USR.1, ADV_HLD.1, ATE_IND.2Similar certificates
Scheme data ?
Cert Id | JISEC-CC-CRP-C0200 | |
---|---|---|
Supplier | Hitachi, Ltd. | |
Toe Overseas Name | ----- | |
Expiration Date | 01.04.2014 | |
Claim | EAL2 | |
Certification Date | 01.12.2008 | |
Toe Overseas Link | None | |
Toe Japan Name | Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14) | |
Toe Japan Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html | |
Enhanced | ||
Product | Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program | |
Toe Version | 60-02-32-00/00(R6-02A-14) | |
Product Type | IT Product (Storage Control Software) | |
Cc Version | 2.3 | |
Assurance Level | EAL2 | |
Vendor | Hitachi, Ltd. | |
Evaluation Facility | Electronic Commerce Security Technology Laboratory Inc. Evaluation Center | |
Report Link | https://www.ipa.go.jp/en/security/c0200_erpt.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0200_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings. |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0200', 'expiration_date': '2014-04-01', 'certification_date': '2008-12-01', 'toe_japan_name': 'Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)', 'enhanced': {'__update__': {'product': 'Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program', 'evaluation_facility': 'Electronic Commerce Security Technology Laboratory Inc. Evaluation Center', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.'}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0200', 'supplier': 'Hitachi, Ltd.', 'toe_overseas_name': '-----', 'expiration_date': '2014-04', 'claim': 'EAL2', 'certification_date': '2008-12', 'toe_overseas_link': None, 'toe_japan_name': 'Hitachi Universal\n Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi\n Universal Storage Platform VM, Hitachi Universal Storage Platform H20000\n Control Program 60-02-32-00/00(R6-02A-14)', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html', 'enhanced': {'product': 'Hitachi Universal Storage \n Platform V, Hitachi Universal \n Storage Platform H24000, \n Hitachi Universal Storage \n Platform VM, Hitachi Universal \n Storage Platform H20000 \n Control Program', 'toe_version': '60-02-32-00/00(R6-02A-14)', 'product_type': 'IT Product (Storage Control Software)', 'certification_date': '2008-12-24', 'cc_version': '2.3', 'assurance_level': 'EAL2', 'vendor': 'Hitachi, Ltd.', 'evaluation_facility': 'Electronic Commerce Security Technology Laboratory Inc.\n Evaluation Center', 'report_link': 'https://www.ipa.go.jp/en/security/c0200_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0200_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. \n \n TOE security functions \n TOE has the following security functions. \n \n - Storage Navigator function\n It sets, changes, etc. the configuration of each function to manage the storage \n subsystem.\n - Virtual Partition Manager function\n It partitions the resources of the entire storage subsystem into multiple virtual disks to \n control access. \n - LUN Manager function\n It associates ports and logical devices that can be accessed by the host. \n - Host identification/authentication function\n When a host is connected to SAN, this function identifies/authenticates the host so that \n invalid host would not be connected. \n - Audit log function\n It records events related to security, such as success/failure of login, changes in\n configuration settings.'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c', 'txt_hash': 'affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800', 'txt_hash': '06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 147813, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 24, '/ModDate': "D:20090401163719+09'00'", '/CreationDate': "D:20090401163719+09'00'", '/Title': 'untitled', '/Producer': 'Acrobat Distiller 6.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 516948, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/CreationDate': "D:20090330094022+09'00'", '/Subject': 'CC EAL2 Security Target', '/Author': '八木', '/Creator': 'Word 用 Acrobat PDFMaker 7.0.7', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20090330094033+09'00'", '/Company': 'Hitachi', '/Title': 'USP_V ST', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0200-01': 1, 'Certification No. C0200': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.ILLEGAL_XCNTL': 1, 'T.TSF_COMP': 1, 'T.LP_LEAK': 1, 'T.CHG_CONFIG': 1}, 'A': {'A.NOEVIL': 1, 'A.NOEVIL_MNT': 1, 'A.PHYSICAL_SEC': 1, 'A.ILLEGAL_SOFT': 1, 'A.CONNECT_STORAGE': 1}}, 'vendor': {'Cisco': {'Cisco': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 2}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.1': 2, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 3, 'AGD_USR.1': 3}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 21, 'FAU_GEN.2': 11, 'FAU_SAR.1': 12, 'FAU_STG.1': 13, 'FAU_STG.3': 12, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1}, 'FCS': {'FCS_COP.1': 17, 'FCS_CKM.1': 20, 'FCS_CKM.2': 16, 'FCS_CKM.4': 18, 'FCS_COP.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.1': 19, 'FDP_IFC.1': 2, 'FDP_ACF.1': 16, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_ATD': 27, 'FIA_ATD.1': 6, 'FIA_USB': 27, 'FIA_USB.1': 6, 'FIA_AFL.1': 13, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 21, 'FIA_SOS': 29, 'FIA_SOS.1': 2, 'FIA_UAU.2': 17, 'FIA_UID.1': 8, 'FIA_UAU.7': 13, 'FIA_UAU.7.1': 1, 'FIA_UID.2': 22, 'FIA_MSA.1.1': 1, 'FIA_MSA.3.1': 1, 'FIA_MSA.3.2': 1, 'FIA_UAU.5': 19, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_SMF.1': 18, 'FMT_SMR.1': 20, 'FMT_MSA.3': 16, 'FMT_MTD.1': 12, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 13, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2': 9, 'FMT_MOF.1.1': 1}, 'FPT': {'FPT_STM.1': 17, 'FPT_RVM.1': 32, 'FPT_SEP.1': 32, 'FPT_STM.1.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}}, 'cc_claims': {'O': {'O.ADM_AUTH': 9, 'O.ADM_ROLE': 5, 'O.SEC_COMM': 8, 'O.HOST_AUTH': 5, 'O.HOST_ACCESS': 8, 'O.AUD_GEN': 6}, 'T': {'T.ILLEGAL_XCNTL': 3, 'T.TSF_COMP': 3, 'T.LP_LEAK': 3, 'T.CHG_CONFIG': 3}, 'A': {'A.NOEVIL': 3, 'A.NOEVIL_MNT': 3, 'A.PHYSICAL_SEC': 3, 'A.ILLEGAL_SOFT': 3, 'A.CONNECT_STORAGE': 3}, 'OE': {'OE.NOEVIL': 2, 'OE.NOEVIL-MNT': 1, 'OE.PHYSICAL_SEC': 3, 'OE.ILLEGAL_SOFT': 2, 'OE.CONNECT_STORAGE': 3, 'OE.NOEVIL_MNT': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 512': 1}, 'FF': {'DH': {'DH': 2}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSLv3.0': 3, 'SSL': 16}, 'TLS': {'TLSv1.0': 3, 'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS#1': 1}, 'CC': {'CCMB-2005-08-001': 4, 'CCMB-2005-08-002': 3, 'CCMB-2005-08-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0200_erpt.pdf
. - The st_filename property was set to
c0200_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0200
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Access Control Devices and Systems",
"cert_link": null,
"dgst": "96e36510c2c8ba64",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0200",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"02",
"60",
"00",
"14",
"32"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0200",
"certification_date": "2008-12-01",
"claim": "EAL2",
"enhanced": {
"assurance_level": "EAL2",
"cc_version": "2.3",
"description": "PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: \u201cHitachi Universal Storage Platform V\u201d, \u201cHitachi Universal Storage Platform H24000\u201d, \u201cHitachi Universal Storage Platform VM\u201d, and \u201cHitachi Universal Storage Platform H20000\u201d. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.",
"evaluation_facility": "Electronic Commerce Security Technology Laboratory Inc. Evaluation Center",
"product": "Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program",
"product_type": "IT Product (Storage Control Software)",
"report_link": "https://www.ipa.go.jp/en/security/c0200_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0200_est.pdf",
"toe_version": "60-02-32-00/00(R6-02A-14)",
"vendor": "Hitachi, Ltd."
},
"expiration_date": "2014-04-01",
"supplier": "Hitachi, Ltd.",
"toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html",
"toe_japan_name": "Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)",
"toe_overseas_link": null,
"toe_overseas_name": "-----"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hitachi, Ltd.",
"manufacturer_web": "https://www.hitachi.com/",
"name": "Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)",
"not_valid_after": "2014-04-08",
"not_valid_before": "2008-12-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0200_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0200-01": 1,
"Certification No. C0200": 1
}
},
"cc_claims": {
"A": {
"A.CONNECT_STORAGE": 1,
"A.ILLEGAL_SOFT": 1,
"A.NOEVIL": 1,
"A.NOEVIL_MNT": 1,
"A.PHYSICAL_SEC": 1
},
"T": {
"T.CHG_CONFIG": 1,
"T.ILLEGAL_XCNTL": 1,
"T.LP_LEAK": 1,
"T.TSF_COMP": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2005-08-001": 2,
"CCMB-2005-08-002": 2,
"CCMB-2005-08-003": 2,
"CCMB-2005-08-004": 2
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20090401163719+09\u002700\u0027",
"/ModDate": "D:20090401163719+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 147813,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
},
"st_filename": "c0200_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 2
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 512": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECT_STORAGE": 3,
"A.ILLEGAL_SOFT": 3,
"A.NOEVIL": 3,
"A.NOEVIL_MNT": 3,
"A.PHYSICAL_SEC": 3
},
"O": {
"O.ADM_AUTH": 9,
"O.ADM_ROLE": 5,
"O.AUD_GEN": 6,
"O.HOST_ACCESS": 8,
"O.HOST_AUTH": 5,
"O.SEC_COMM": 8
},
"OE": {
"OE.CONNECT_STORAGE": 3,
"OE.ILLEGAL_SOFT": 2,
"OE.NOEVIL": 2,
"OE.NOEVIL-MNT": 1,
"OE.NOEVIL_MNT": 1,
"OE.PHYSICAL_SEC": 3
},
"T": {
"T.CHG_CONFIG": 3,
"T.ILLEGAL_XCNTL": 3,
"T.LP_LEAK": 3,
"T.TSF_COMP": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 2
},
"ADO": {
"ADO_DEL.1": 2,
"ADO_IGS.1": 3
},
"ADV": {
"ADV_FSP.1": 2,
"ADV_HLD.1": 2,
"ADV_RCR.1": 1
},
"AGD": {
"AGD_ADM.1": 3,
"AGD_USR.1": 3
},
"ATE": {
"ATE_COV.1": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_SOF.1": 2,
"AVA_VLA.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 21,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 11,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 12,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 13,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 12,
"FAU_STG.3.1": 1
},
"FCS": {
"FCS_CKM.1": 20,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 16,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 18,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 17,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 19,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 16,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6
},
"FIA": {
"FIA_AFL.1": 13,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 27,
"FIA_ATD.1": 6,
"FIA_MSA.1.1": 1,
"FIA_MSA.3.1": 1,
"FIA_MSA.3.2": 1,
"FIA_SOS": 29,
"FIA_SOS.1": 2,
"FIA_UAU.1": 21,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.2": 17,
"FIA_UAU.5": 19,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 13,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 8,
"FIA_UID.2": 22,
"FIA_USB": 27,
"FIA_USB.1": 6
},
"FMT": {
"FMT_MOF.1": 13,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 16,
"FMT_MSA.2": 9,
"FMT_MSA.3": 16,
"FMT_MTD.1": 12,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 18,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 20,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_RVM.1": 32,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 32,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 17,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 16,
"SSLv3.0": 3
},
"TLS": {
"TLS": 3,
"TLSv1.0": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2005-08-001": 4,
"CCMB-2005-08-002": 3,
"CCMB-2005-08-003": 2
},
"FIPS": {
"FIPS PUB 180-2": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1
},
"PKCS": {
"PKCS#1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "\u516b\u6728",
"/Company": "Hitachi",
"/CreationDate": "D:20090330094022+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 7.0.7",
"/ModDate": "D:20090330094033+09\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/Subject": "CC EAL2 Security Target",
"/Title": "USP_V ST",
"pdf_file_size_bytes": 516948,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 93
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c",
"txt_hash": "affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800",
"txt_hash": "06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5"
}
},
"status": "archived"
}