Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)

CSV information ?

Status archived
Valid from 24.12.2008
Valid until 08.04.2014
Scheme 🇯🇵 JP
Manufacturer Hitachi, Ltd.
Category Access Control Devices and Systems
Security level EAL2

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0200

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL

Vendor
Cisco

Security level
EAL2
Claims
T.ILLEGAL_XCNTL, T.TSF_COMP, T.LP_LEAK, T.CHG_CONFIG, A.NOEVIL, A.NOEVIL_MNT, A.PHYSICAL_SEC, A.ILLEGAL_SOFT, A.CONNECT_STORAGE
Certificates
CRP-C0200-01, Certification No. C0200

Standards
ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title untitled
Creation date D:20090401163719+09'00'
Modification date D:20090401163719+09'00'
Pages 24
Producer Acrobat Distiller 6.0 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, 3DES
Asymmetric Algorithms
RSA 512, DH, DSA
Hash functions
SHA-1
Protocols
SSLv3.0, SSL, TLSv1.0, TLS

Vendor
Microsoft, Microsoft Corporation

Security level
EAL 2, EAL2
Claims
O.ADM_AUTH, O.ADM_ROLE, O.SEC_COMM, O.HOST_AUTH, O.HOST_ACCESS, O.AUD_GEN, T.ILLEGAL_XCNTL, T.TSF_COMP, T.LP_LEAK, T.CHG_CONFIG, A.NOEVIL, A.NOEVIL_MNT, A.PHYSICAL_SEC, A.ILLEGAL_SOFT, A.CONNECT_STORAGE, OE.NOEVIL, OE.NOEVIL-MNT, OE.PHYSICAL_SEC, OE.ILLEGAL_SOFT, OE.CONNECT_STORAGE, OE.NOEVIL_MNT
Security Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FDP_ACC.1, FDP_IFC.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_ATD, FIA_ATD.1, FIA_USB, FIA_USB.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_SOS, FIA_SOS.1, FIA_UAU.2, FIA_UID.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2, FIA_MSA.1.1, FIA_MSA.3.1, FIA_MSA.3.2, FIA_UAU.5, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_MOF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.2, FMT_MOF.1.1, FPT_STM.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2

Standards
FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-2, PKCS#1, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003

File metadata

Title USP_V ST
Subject CC EAL2 Security Target
Author 八木
Creation date D:20090330094022+09'00'
Modification date D:20090330094033+09'00'
Pages 93
Creator Word 用 Acrobat PDFMaker 7.0.7
Producer Acrobat Distiller 7.0.5 (Windows)

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0200

Extracted SARs

ADV_FSP.1, AVA_SOF.1, AGD_ADM.1, AVA_VLA.1, ATE_COV.1, ATE_FUN.1, ADV_RCR.1, AGD_USR.1, ADV_HLD.1, ATE_IND.2

Scheme data ?

Cert Id JISEC-CC-CRP-C0200
Supplier Hitachi, Ltd.
Toe Overseas Name -----
Expiration Date 01.04.2014
Claim EAL2
Certification Date 01.12.2008
Toe Overseas Link None
Toe Japan Name Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)
Toe Japan Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
Enhanced
Product Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
Toe Version 60-02-32-00/00(R6-02A-14)
Product Type IT Product (Storage Control Software)
Cc Version 2.3
Assurance Level EAL2
Vendor Hitachi, Ltd.
Evaluation Facility Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
Report Link https://www.ipa.go.jp/en/security/c0200_erpt.pdf
Target Link https://www.ipa.go.jp/en/security/c0200_est.pdf
Description PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'JISEC-CC-CRP-C0200', 'expiration_date': '2014-04-01', 'certification_date': '2008-12-01', 'toe_japan_name': 'Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)', 'enhanced': {'__update__': {'product': 'Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program', 'evaluation_facility': 'Electronic Commerce Security Technology Laboratory Inc. Evaluation Center', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.'}, '__delete__': ['certification_date']}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'C0200', 'supplier': 'Hitachi, Ltd.', 'toe_overseas_name': '-----', 'expiration_date': '2014-04', 'claim': 'EAL2', 'certification_date': '2008-12', 'toe_overseas_link': None, 'toe_japan_name': 'Hitachi Universal\n Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi\n Universal Storage Platform VM, Hitachi Universal Storage Platform H20000\n Control Program 60-02-32-00/00(R6-02A-14)', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html', 'enhanced': {'product': 'Hitachi Universal Storage \n Platform V, Hitachi Universal \n Storage Platform H24000, \n Hitachi Universal Storage \n Platform VM, Hitachi Universal \n Storage Platform H20000 \n Control Program', 'toe_version': '60-02-32-00/00(R6-02A-14)', 'product_type': 'IT Product (Storage Control Software)', 'certification_date': '2008-12-24', 'cc_version': '2.3', 'assurance_level': 'EAL2', 'vendor': 'Hitachi, Ltd.', 'evaluation_facility': 'Electronic Commerce Security Technology Laboratory Inc.\n Evaluation Center', 'report_link': 'https://www.ipa.go.jp/en/security/c0200_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0200_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. \n \n TOE security functions \n TOE has the following security functions. \n \n - Storage Navigator function\n It sets, changes, etc. the configuration of each function to manage the storage \n subsystem.\n - Virtual Partition Manager function\n It partitions the resources of the entire storage subsystem into multiple virtual disks to \n control access. \n - LUN Manager function\n It associates ports and logical devices that can be accessed by the host. \n - Host identification/authentication function\n When a host is connected to SAN, this function identifies/authenticates the host so that \n invalid host would not be connected. \n - Audit log function\n It records events related to security, such as success/failure of login, changes in\n configuration settings.'}}.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c', 'txt_hash': 'affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800', 'txt_hash': '06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 147813, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 24, '/ModDate': "D:20090401163719+09'00'", '/CreationDate': "D:20090401163719+09'00'", '/Title': 'untitled', '/Producer': 'Acrobat Distiller 6.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 516948, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/CreationDate': "D:20090330094022+09'00'", '/Subject': 'CC EAL2 Security Target', '/Author': '八木', '/Creator': 'Word 用 Acrobat PDFMaker 7.0.7', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20090330094033+09'00'", '/Company': 'Hitachi', '/Title': 'USP_V ST', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0200-01': 1, 'Certification No. C0200': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.ILLEGAL_XCNTL': 1, 'T.TSF_COMP': 1, 'T.LP_LEAK': 1, 'T.CHG_CONFIG': 1}, 'A': {'A.NOEVIL': 1, 'A.NOEVIL_MNT': 1, 'A.PHYSICAL_SEC': 1, 'A.ILLEGAL_SOFT': 1, 'A.CONNECT_STORAGE': 1}}, 'vendor': {'Cisco': {'Cisco': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 2}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.1': 2, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 3, 'AGD_USR.1': 3}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 21, 'FAU_GEN.2': 11, 'FAU_SAR.1': 12, 'FAU_STG.1': 13, 'FAU_STG.3': 12, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1}, 'FCS': {'FCS_COP.1': 17, 'FCS_CKM.1': 20, 'FCS_CKM.2': 16, 'FCS_CKM.4': 18, 'FCS_COP.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.1': 19, 'FDP_IFC.1': 2, 'FDP_ACF.1': 16, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_ATD': 27, 'FIA_ATD.1': 6, 'FIA_USB': 27, 'FIA_USB.1': 6, 'FIA_AFL.1': 13, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 21, 'FIA_SOS': 29, 'FIA_SOS.1': 2, 'FIA_UAU.2': 17, 'FIA_UID.1': 8, 'FIA_UAU.7': 13, 'FIA_UAU.7.1': 1, 'FIA_UID.2': 22, 'FIA_MSA.1.1': 1, 'FIA_MSA.3.1': 1, 'FIA_MSA.3.2': 1, 'FIA_UAU.5': 19, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_SMF.1': 18, 'FMT_SMR.1': 20, 'FMT_MSA.3': 16, 'FMT_MTD.1': 12, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 13, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2': 9, 'FMT_MOF.1.1': 1}, 'FPT': {'FPT_STM.1': 17, 'FPT_RVM.1': 32, 'FPT_SEP.1': 32, 'FPT_STM.1.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}}, 'cc_claims': {'O': {'O.ADM_AUTH': 9, 'O.ADM_ROLE': 5, 'O.SEC_COMM': 8, 'O.HOST_AUTH': 5, 'O.HOST_ACCESS': 8, 'O.AUD_GEN': 6}, 'T': {'T.ILLEGAL_XCNTL': 3, 'T.TSF_COMP': 3, 'T.LP_LEAK': 3, 'T.CHG_CONFIG': 3}, 'A': {'A.NOEVIL': 3, 'A.NOEVIL_MNT': 3, 'A.PHYSICAL_SEC': 3, 'A.ILLEGAL_SOFT': 3, 'A.CONNECT_STORAGE': 3}, 'OE': {'OE.NOEVIL': 2, 'OE.NOEVIL-MNT': 1, 'OE.PHYSICAL_SEC': 3, 'OE.ILLEGAL_SOFT': 2, 'OE.CONNECT_STORAGE': 3, 'OE.NOEVIL_MNT': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 512': 1}, 'FF': {'DH': {'DH': 2}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSLv3.0': 3, 'SSL': 16}, 'TLS': {'TLSv1.0': 3, 'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS#1': 1}, 'CC': {'CCMB-2005-08-001': 4, 'CCMB-2005-08-002': 3, 'CCMB-2005-08-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to c0200_erpt.pdf.
    • The st_filename property was set to c0200_est.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0200.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "96e36510c2c8ba64",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0200",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "02",
        "60",
        "00",
        "14",
        "32"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0200",
      "certification_date": "2008-12-01",
      "claim": "EAL2",
      "enhanced": {
        "assurance_level": "EAL2",
        "cc_version": "2.3",
        "description": "PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: \u201cHitachi Universal Storage Platform V\u201d, \u201cHitachi Universal Storage Platform H24000\u201d, \u201cHitachi Universal Storage Platform VM\u201d, and \u201cHitachi Universal Storage Platform H20000\u201d. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.",
        "evaluation_facility": "Electronic Commerce Security Technology Laboratory Inc. Evaluation Center",
        "product": "Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program",
        "product_type": "IT Product (Storage Control Software)",
        "report_link": "https://www.ipa.go.jp/en/security/c0200_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0200_est.pdf",
        "toe_version": "60-02-32-00/00(R6-02A-14)",
        "vendor": "Hitachi, Ltd."
      },
      "expiration_date": "2014-04-01",
      "supplier": "Hitachi, Ltd.",
      "toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html",
      "toe_japan_name": "Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)",
      "toe_overseas_link": null,
      "toe_overseas_name": "-----"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Hitachi, Ltd.",
  "manufacturer_web": "https://www.hitachi.com/",
  "name": "Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)",
  "not_valid_after": "2014-04-08",
  "not_valid_before": "2008-12-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0200_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0200-01": 1,
          "Certification No. C0200": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CONNECT_STORAGE": 1,
          "A.ILLEGAL_SOFT": 1,
          "A.NOEVIL": 1,
          "A.NOEVIL_MNT": 1,
          "A.PHYSICAL_SEC": 1
        },
        "T": {
          "T.CHG_CONFIG": 1,
          "T.ILLEGAL_XCNTL": 1,
          "T.LP_LEAK": 1,
          "T.TSF_COMP": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2,
          "CCMB-2005-08-004": 2
        },
        "ISO": {
          "ISO/IEC 15408:2005": 1,
          "ISO/IEC 18045:2005": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20090401163719+09\u002700\u0027",
      "/ModDate": "D:20090401163719+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "untitled",
      "pdf_file_size_bytes": 147813,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "c0200_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 2
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 512": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECT_STORAGE": 3,
          "A.ILLEGAL_SOFT": 3,
          "A.NOEVIL": 3,
          "A.NOEVIL_MNT": 3,
          "A.PHYSICAL_SEC": 3
        },
        "O": {
          "O.ADM_AUTH": 9,
          "O.ADM_ROLE": 5,
          "O.AUD_GEN": 6,
          "O.HOST_ACCESS": 8,
          "O.HOST_AUTH": 5,
          "O.SEC_COMM": 8
        },
        "OE": {
          "OE.CONNECT_STORAGE": 3,
          "OE.ILLEGAL_SOFT": 2,
          "OE.NOEVIL": 2,
          "OE.NOEVIL-MNT": 1,
          "OE.NOEVIL_MNT": 1,
          "OE.PHYSICAL_SEC": 3
        },
        "T": {
          "T.CHG_CONFIG": 3,
          "T.ILLEGAL_XCNTL": 3,
          "T.LP_LEAK": 3,
          "T.TSF_COMP": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.2": 2
        },
        "ADO": {
          "ADO_DEL.1": 2,
          "ADO_IGS.1": 3
        },
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_HLD.1": 2,
          "ADV_RCR.1": 1
        },
        "AGD": {
          "AGD_ADM.1": 3,
          "AGD_USR.1": 3
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_SOF.1": 2,
          "AVA_VLA.1": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 21,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 11,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 12,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 13,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 12,
          "FAU_STG.3.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 20,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 16,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 18,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 17,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 19,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 16,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 2,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 6
        },
        "FIA": {
          "FIA_AFL.1": 13,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 27,
          "FIA_ATD.1": 6,
          "FIA_MSA.1.1": 1,
          "FIA_MSA.3.1": 1,
          "FIA_MSA.3.2": 1,
          "FIA_SOS": 29,
          "FIA_SOS.1": 2,
          "FIA_UAU.1": 21,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.2": 17,
          "FIA_UAU.5": 19,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 13,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 8,
          "FIA_UID.2": 22,
          "FIA_USB": 27,
          "FIA_USB.1": 6
        },
        "FMT": {
          "FMT_MOF.1": 13,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 16,
          "FMT_MSA.2": 9,
          "FMT_MSA.3": 16,
          "FMT_MTD.1": 12,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 20,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_RVM.1": 32,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 32,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 17,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 16,
            "SSLv3.0": 3
          },
          "TLS": {
            "TLS": 3,
            "TLSv1.0": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 4,
          "CCMB-2005-08-002": 3,
          "CCMB-2005-08-003": 2
        },
        "FIPS": {
          "FIPS PUB 180-2": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1
        },
        "PKCS": {
          "PKCS#1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1,
          "Microsoft Corporation": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "\u516b\u6728",
      "/Company": "Hitachi",
      "/CreationDate": "D:20090330094022+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 7.0.7",
      "/ModDate": "D:20090330094033+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Subject": "CC EAL2 Security Target",
      "/Title": "USP_V ST",
      "pdf_file_size_bytes": 516948,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 93
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c",
      "txt_hash": "affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800",
      "txt_hash": "06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5"
    }
  },
  "status": "archived"
}