Cortex M33 r0p4
CSV information ?
Status | active |
---|---|
Valid from | 13.02.2020 |
Valid until | 13.02.2025 |
Scheme | 🇳🇱 NL |
Manufacturer | Arm Limited |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ASE_TSS.2, ALC_FLR.1, EAL6+ |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL6, EAL7, EAL6 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ASE_TSS.2Certificates
CC-20-202003Evaluation facilities
BrightsightStandards
ISO/IEC 15408, ISO/IEC 18045File metadata
Creation date | D:20200213160251+01'00' |
---|---|
Modification date | D:20200213160645+01'00' |
Pages | 1 |
Creator | NL-ARN-SAL-C |
Producer | KONICA MINOLTA bizhub C300i |
Certification report ?
Extracted keywords
Randomness
RNGSecurity level
EAL4, EAL6+, EAL6, EAL4+, EAL 6, EAL6 augmented, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP, ALC_FLR.1, AVA_VAN.5, ASE_TSS.2, ASE_TSS.1Protection profiles
BSI-PP-0084-2014Certificates
NSCIB-CC-202003-CREvaluation facilities
BrightsightSide-channel analysis
JIL-COMP, JIL-AAPS, JILFile metadata
Title | Certification Report NSCIB-CC-202003-CR v1.1.docx |
---|---|
Author | p647 |
Creation date | D:20200617122500+02'00' |
Pages | 13 |
Creator | pdfFactory Pro www.pdffactory.com |
Producer | pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch) |
Frontpage
Certificate ID | NSCIB-CC-202003-CR |
---|---|
Certified item | Cortex M33 r0p4 |
Certification lab | Brightsight |
Developer | Arm Limited |
Security target ?
Extracted keywords
Schemes
MACRandomness
RNDTrusted Execution Environments
SESecurity level
EAL6, EAL4, EAL6 augmented, EAL4 augmentedClaims
T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_SPM.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_ARC, ADV_FSP, ADV_IMP, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FDP_ACC.2, FDP_ACC, FDP_ACF.1, FDP_ACF, FDP_ACC.1, FDP_IFC.1, FMT_MSA.3, FMT_MSA, FMT_MSA.1, FMT_SMF.1, FMT_SMF, FMT_SMR.1, FPT_FLS.1Protection profiles
BSI-CC-PP-0084-2014Side-channel analysis
Leak-Inherent, Physical Probing, MalfunctionCertification process
out of scope, Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery, 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out, transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This, to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but, contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in, This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation, must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of, This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are, 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This, is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for theStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20200114111242+01'00' |
---|---|
Modification date | D:20200114111313+01'00' |
Pages | 53 |
Creator | Acrobat PDFMaker 15 for Word |
Producer | Adobe PDF Library 15.0 |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ADV_IMP.2, ADV_ARC.1, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, ASE_TSS.2, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ASE_INT.1, AGD_PRE.1, ADV_TDS.5, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2Scheme data ?
Manufacturer | Arm Limited | |
---|---|---|
Product | Cortex M33 r0p4 | |
Scheme | NSCIB | |
Cert Id | NSCIB-CC-20-202003-CR | |
Manufacturer Link | http://www.arm.com | |
Level | EAL6 augmented with ALC_FLR.1 and ASE_TSS.2 | |
Cert Link | https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/02/cc-20-202003.pdf | |
Report Link | https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/06/certification-report-nscib-cc-202003-cr-v1.1.pdf | |
Target Link | https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/02/m33-stl-arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'NSCIB-CC-20-202003-CR'}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '63b9c6431ed90b1ea675a52b67bd0e40da30855e491cee888b90205af7a770d1', 'txt_hash': 'aa0b8d033ae52c725ddbae153e1dbaa0f3c13372d95717d4cb35108ef52d9996'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '15e24a0559b88716a72f8fb08d727a5500e1e45ca75cc79ea30ed54b98a01fdf', 'txt_hash': '0b51504d1e0d68a40998fd130db4c6a17e4a5c48a2b19fa48c5f618f355b2d4f'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 631615, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 53, '/Author': '', '/ContentTypeId': '0x010100A8B48D26C6F1F04297EA635FC081D18100BCD4AE3A3793464CA413EFC4B5DDFF84', '/CreationDate': "D:20200114111242+01'00'", '/Creator': 'Acrobat PDFMaker 15 for Word', '/Document Type': '', '/ModDate': "D:20200114111313+01'00'", '/Producer': 'Adobe PDF Library 15.0', '/Security Classification': '', '/SourceModified': '', '/Title': '', '/_dlc_DocIdItemGuid': '8a4541cf-d2a4-4635-bb38-c025604d1781', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.arm.com/company/policies/trademarks', 'http://www.arm.com/', 'http://infocenter.arm.com/help/topic/com.arm.doc.aeg0014-/index.html']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 173675, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20200213160251+01'00'", '/Creator': 'NL-ARN-SAL-C', '/ModDate': "D:20200213160645+01'00'", '/Producer': 'KONICA MINOLTA bizhub C300i', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 11, 'EAL4': 1, 'EAL6 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_SPM.1': 8, 'ADV_FSP.5': 1, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 2}, 'ALC': {'ALC_FLR.1': 7, 'ALC_DVS.2': 2, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 8, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FDP': {'FDP_ACC.2': 10, 'FDP_ACC': 23, 'FDP_ACF.1': 23, 'FDP_ACF': 22, 'FDP_ACC.1': 11, 'FDP_IFC.1': 4}, 'FMT': {'FMT_MSA.3': 15, 'FMT_MSA': 38, 'FMT_MSA.1': 10, 'FMT_SMF.1': 10, 'FMT_SMF': 18, 'FMT_SMR.1': 11}, 'FPT': {'FPT_FLS.1': 1}}, 'cc_claims': {'T': {'T.RND': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 6, 'Physical Probing': 2}, 'FI': {'Malfunction': 6}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 94}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 12, 'Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery': 1, '205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out': 1, 'transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This': 1, 'to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but': 1, 'contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in': 1, 'This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation': 1, 'must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of': 1, 'This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are': 1, '240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This': 1, 'is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'NL': {'CC-20-202003': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL6': 1, 'EAL7': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
[M33-STL] arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf
. - The cert_filename property was set to
CC-20-202003.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b5695eca1de6d58db99d1735e56a5f7fdb334334d7faf591f8e2e1518b21c3df', 'txt_hash': '45ff3c52ee8e2653aac13074bb49a7a52463dc291e59dddfe6e4ecccf556a70f'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 138797, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 13, '/Author': 'p647', '/CreationDate': "D:20200617122500+02'00'", '/Creator': 'pdfFactory Pro www.pdffactory.com', '/Producer': 'pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)', '/Title': 'Certification Report NSCIB-CC-202003-CR v1.1.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.tuv.com/nl', 'mailto:[email protected]', 'http://www.sogisportal.eu', 'http://www.commoncriteriaportal.org']}}
. - The report_frontpage property was set to
{'NL': {'cert_id': 'NSCIB-CC-202003-CR', 'cert_item': 'Cortex M33 r0p4', 'developer': 'Arm Limited', 'cert_lab': ' Brightsight'}}
. - The report_keywords property was set to
{'cc_cert_id': {'NL': {'NSCIB-CC-202003-CR': 13}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL6+': 3, 'EAL6': 5, 'EAL4+': 2, 'EAL 6': 1, 'EAL6 augmented': 3, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_IMP': 1}, 'ALC': {'ALC_FLR.1': 2}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_TSS.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL-COMP': 3, 'JIL-AAPS': 2, 'JIL': 5}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
Certification Report NSCIB-CC-202003-CR v1.1.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['']
. - The cert_id property was set to
NSCIB-CC-202003-CR
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-202003-CR%20v1.1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[M33-STL]%20arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
NSCIB-CC-20-202003-CR
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cortex M33 r0p4 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-20-202003.pdf",
"dgst": "d9414c80a0ee7958",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-202003-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "NSCIB-CC-20-202003-CR",
"cert_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/02/cc-20-202003.pdf",
"level": "EAL6 augmented with ALC_FLR.1 and ASE_TSS.2",
"manufacturer": "Arm Limited",
"manufacturer_link": "http://www.arm.com",
"product": "Cortex M33 r0p4",
"report_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/06/certification-report-nscib-cc-202003-cr-v1.1.pdf",
"scheme": "NSCIB",
"target_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/02/m33-stl-arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Arm Limited",
"manufacturer_web": "https://www.arm.com",
"name": "Cortex M33 r0p4",
"not_valid_after": "2025-02-13",
"not_valid_before": "2020-02-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "CC-20-202003.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-20-202003": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 1
},
"ASE": {
"ASE_TSS.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL6": 1,
"EAL6 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20200213160251+01\u002700\u0027",
"/Creator": "NL-ARN-SAL-C",
"/ModDate": "D:20200213160645+01\u002700\u0027",
"/Producer": "KONICA MINOLTA bizhub C300i",
"pdf_file_size_bytes": 173675,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "Certification Report NSCIB-CC-202003-CR v1.1.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-202003-CR",
"cert_item": "Cortex M33 r0p4",
"cert_lab": " Brightsight",
"developer": "Arm Limited"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"NSCIB-CC-202003-CR": 13
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_IMP": 1
},
"ALC": {
"ALC_FLR.1": 2
},
"ASE": {
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL4": 1,
"EAL4+": 2,
"EAL6": 5,
"EAL6 augmented": 3,
"EAL6+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"other": {
"JIL": 5,
"JIL-AAPS": 2,
"JIL-COMP": 3
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "p647",
"/CreationDate": "D:20200617122500+02\u002700\u0027",
"/Creator": "pdfFactory Pro www.pdffactory.com",
"/Producer": "pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)",
"/Title": "Certification Report NSCIB-CC-202003-CR v1.1.docx",
"pdf_file_size_bytes": 138797,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogisportal.eu",
"http://www.tuv.com/nl",
"mailto:[email protected]",
"http://www.commoncriteriaportal.org"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 13
},
"st_filename": "[M33-STL] arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.5": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT.3": 1,
"ADV_SPM.1": 8,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR.1": 7,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.2": 8
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 1,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4 augmented": 1,
"EAL6": 11,
"EAL6 augmented": 3
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 23,
"FDP_ACC.1": 11,
"FDP_ACC.2": 10,
"FDP_ACF": 22,
"FDP_ACF.1": 23,
"FDP_IFC.1": 4
},
"FMT": {
"FMT_MSA": 38,
"FMT_MSA.1": 10,
"FMT_MSA.3": 15,
"FMT_SMF": 18,
"FMT_SMF.1": 10,
"FMT_SMR.1": 11
},
"FPT": {
"FPT_FLS.1": 1
}
},
"certification_process": {
"OutOfScope": {
"205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out": 1,
"240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This": 1,
"Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery": 1,
"This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation": 1,
"This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are": 1,
"contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in": 1,
"is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the": 1,
"must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of": 1,
"out of scope": 12,
"to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but": 1,
"transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 4
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 6
},
"SCA": {
"Leak-Inherent": 6,
"Physical Probing": 2
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 94
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/ContentTypeId": "0x010100A8B48D26C6F1F04297EA635FC081D18100BCD4AE3A3793464CA413EFC4B5DDFF84",
"/CreationDate": "D:20200114111242+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 15 for Word",
"/Document Type": "",
"/ModDate": "D:20200114111313+01\u002700\u0027",
"/Producer": "Adobe PDF Library 15.0",
"/Security Classification": "",
"/SourceModified": "",
"/Title": "",
"/_dlc_DocIdItemGuid": "8a4541cf-d2a4-4635-bb38-c025604d1781",
"pdf_file_size_bytes": 631615,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.arm.com/company/policies/trademarks",
"http://infocenter.arm.com/help/topic/com.arm.doc.aeg0014-/index.html",
"http://www.arm.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 53
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-202003-CR%20v1.1.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"ASE_TSS.2",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[M33-STL]%20arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "15e24a0559b88716a72f8fb08d727a5500e1e45ca75cc79ea30ed54b98a01fdf",
"txt_hash": "0b51504d1e0d68a40998fd130db4c6a17e4a5c48a2b19fa48c5f618f355b2d4f"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b5695eca1de6d58db99d1735e56a5f7fdb334334d7faf591f8e2e1518b21c3df",
"txt_hash": "45ff3c52ee8e2653aac13074bb49a7a52463dc291e59dddfe6e4ecccf556a70f"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "63b9c6431ed90b1ea675a52b67bd0e40da30855e491cee888b90205af7a770d1",
"txt_hash": "aa0b8d033ae52c725ddbae153e1dbaa0f3c13372d95717d4cb35108ef52d9996"
}
},
"status": "active"
}