IBM z/VM Version 7 Release 2 for VPP

CSV information ?

Status active
Valid from 10.06.2022
Valid until 10.06.2027
Scheme 🇮🇹 IT
Manufacturer IBM Corporation
Category Operating Systems
Security level

Heuristics summary ?

Certificate ID: OCSI/CERT/ATS/04/2021/RC

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL, TLS
Randomness
RNG

Security level
EAL4, EAL2
Claims
O.J
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, AGD_BVPP.1, AGD_SVEP.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ALC_FLR, ALC_BVPP.1, ATE_IND.1, ATE_BVPP.1, ATE_SVEP.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ASE_BVPP.1, ASE_SVEP.1
Certificates
OCSI/CERT/ATS/04/2021/RC, OCSI/CERT/ATS/05/2020/RC
Evaluation facilities
atsec

Standards
ISO/IEC 15408, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title Certification Report "IBM z/VM Version 7 Release 2 for VPP"
Author OCSI
Creation date D:20220610071118+00'00'
Modification date D:20220610071118+00'00'
Pages 30
Creator Microsoft Word

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, KMAC
Asymmetric Algorithms
Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
MAC
Protocols
SSL 1.0, SSL 2.0, SSL 3.0, SSL, TLS, TLS 1.2, TLS 1.0, TLS 1.1, VPN
Randomness
TRNG, RBG
Libraries
NSS
Block cipher modes
CFB, OFB
TLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

Trusted Execution Environments
SE

Claims
O.VM_ISOLATION, O.VMM_INTEGRITY, O.DOMAIN_INTEGRITY, O.MANAGEMENT_ACCESS, O.PATCHED_SOFTWARE, O.VM_ENTROPY, O.AUDIT, O.CORRECTLY_APPLIED_CONFIGURATION, O.RESOURCE_ALLOCATION, O.PLATFORM_INTEGRITY, O.CORRECTL, T.DATA_LEAKAGE, T.UNAUTHORIZED_UPDATE, T.UNAUTHORIZED_MODIFICATION, T.USER_ERROR, T.PLATFORM_COMPROMISE, T.UNAUTHORIZED_ACCESS, T.WEAK_CRYPTO, T.UNPATCHED_SOFTWARE, T.MISCONFIGURATION, T.DENIAL_OF_SERVICE, T.VMM_COMPROMISE, A.PLATFORM_INTEGRITY, A.COVERT_CHANNELS, A.PHYSICAL, A.TRUSTED_ADMIN, A.NON_MALICIOUS_USER, OE.CONFIG, OE.PHYSICAL, OE.COVERT_CHANNELS, OE.NON_MALICIOUS_USER, OE.TRUSTED_ADMIN
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_TSU_EXT.1, ALC_TSU_EXT.1.1, ALC_TSU_EXT, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_STG_EXT.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_SAR, FAU_GEN, FAU_STG, FAU_STG_EXT, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.4, FCS_COP.1, FCS_ENT_EXT.1, FCS_RBG_EXT.1, FCS_TLSS_EXT.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_COP.1.1, FCS_ENT_EXT.1.1, FCS_ENT_EXT.1.2, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_TLSS_EXT, FCS_CKM, FCS_CKM_EXT, FCS_RBG_EXT, FCS_ENT_EXT, FCS_CKM.4, FDP_HBI_EXT.1, FDP_PPR_EXT.1, FDP_RIP_EXT.1, FDP_RIP_EXT.2, FDP_VMS_EXT.1, FDP_VNC_EXT.1, FDP_VMS_EXT.1.1, FDP_VNC_EXT.1.2, FDP_HBI_EXT.1.1, FDP_PPR_EXT.1.1, FDP_PPR_EXT.1.2, FDP_PPR_EXT.1.3, FDP_RIP_EXT.1.1, FDP_RIP_EXT.2.1, FDP_VMS_EXT.1.2, FDP_VMS_EXT.1.3, FDP_VNC_EXT.1.1, FDP_HBI_EXT, FDP_PPR_EXT, FDP_VMS_EXT, FDP_VNC_EXT, FDP_RIP_EXT, FIA_AFL_EXT.1, FIA_PMG_EXT.1, FIA_UAU.5, FIA_UIA_EXT.1, FIA_AFL_EXT.1.1, FIA_AFL_EXT.1.2, FIA_PMG_EXT.1.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UIA_EXT.1.1, FIA_AFL_EXT, FIA_PMG_EXT, FIA_UAU, FIA_UIA_EXT, FMT_MOF_EXT.1, FMT_MSA_EXT.1, FMT_SMO_EXT.1, FMT_MOF_EXT, FMT_MSA_EXT, FMT_SMO_EXT, FPT_DVD_EXT.1, FPT_EEM_EXT.1, FPT_HAS_EXT.1, FPT_HCL_EXT.1, FPT_RDM_EXT.1, FPT_TUD_EXT.1, FPT_VDP_EXT.1, FPT_VIV_EXT.1, FPT_VDP_EXT.1.2, FPT_VIV_EXT.1.2, FPT_DVD_EXT.1.1, FPT_EEM_EXT.1.1, FPT_HAS_EXT.1.1, FPT_HAS_EXT.1.2, FPT_HCL_EXT.1.1, FPT_HCL_EXT.1.2, FPT_HCL_EXT.1.3, FPT_HCL_EXT.1.4, FPT_RDM_EXT.1.1, FPT_RDM_EXT.1.2, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_VDP_EXT.1.1, FPT_VIV_EXT.1.1, FPT_HCL_EXT, FPT_RDM_EXT, FPT_VIV_EXT, FPT_EEM_EXT, FPT_HAS_EXT, FPT_VDP_EXT, FPT_DVD_EXT, FPT_TUD_EXT, FPT_STM.1, FTA_TAB.1, FTA_TAB.1.1, FTA_TAB, FTP_ITC_EXT.1, FTP_UIF_EXT.1, FTP_UIF_EXT.2, FTP_ITC_EXT.1.1, FTP_UIF_EXT.1.1, FTP_UIF_EXT.2.1, FTP_ITC_EXT, FTP_UIF_EXT

Side-channel analysis
side-channels

Standards
FIPS 140-2, FIPS PUB 186-4, FIPS PUB 197, FIPS PUB 180-4, FIPS PUB 198-1, FIPS 186-4, NIST SP 800-38A, NIST SP 800-57, RFC 5246, RFC 3268, RFC 5280, RFC 2560, RFC 5759, X.509

File metadata

Title IBM z/VM Version 7 Release 2 for VPP Security Target (version 1.0 as of 2022-05-16)
Subject IBM z/VM
Keywords Security Target, Common Criteria
Author Brian W. Hugenbruch, IBM (generated by CCTool version 2.8.4.49)
Creation date D:20220603064747Z
Modification date D:20220603064747Z
Pages 91
Creator Unknown
Producer XEP 4.18 build 20100322

Heuristics ?

Certificate ID: OCSI/CERT/ATS/04/2021/RC

Extracted SARs

ADV_FSP.1, ASE_BVPP.1, ASE_CCL.1, ASE_TSS.1, ATE_BVPP.1, AGD_SVEP.1, ASE_SPD.1, ATE_IND.1, ASE_REQ.1, AGD_OPE.1, ATE_SVEP.1, AGD_BVPP.1, ASE_ECD.1, ALC_BVPP.1, ALC_CMC.1, AVA_VAN.1, ALC_TSU_EXT.1, ASE_SVEP.1, ALC_CMS.1, ASE_INT.1, AGD_PRE.1, ASE_OBJ.2

Scheme data ?

Title IBM z/VM Version 7 Release 2 for VPP
Supplier IBM Corporation
Level conforme a PP_BASE_VIRTUALIZATION_V1.0
Certification Date 10.06.2022
Report Link It https://www.ocsi.gov.it/documenti/certificazioni/ibm/zvm/rc_zvm_v7r2_vpp_v1.0_it.pdf
Report Link En https://www.ocsi.gov.it/documenti/certificazioni/ibm/zvm/cr_zvm_v7r2_vpp_v1.0_en.pdf
Target Link https://www.ocsi.gov.it/documenti/certificazioni/ibm/zvm/st_zvm_v7r2_vpp_v1.0.pdf

References ?

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'supplier': 'IBM Corporation', 'level': 'conforme a PP_BASE_VIRTUALIZATION_V1.0', 'certification_date': '2022-06-10'} data.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'title': 'IBM z/VM Version 7 Release 2 for VPP', 'supplier': ' IBM Corporation', 'level': ' conforme a PP_BASE_VIRTUALIZATION_V1.0', 'certification_date': ' 10 giugno\n\t\t\t\t\t\t\t\t\t\t\t2022', 'report_link_it': 'https://www.ocsi.gov.it/documenti/certificazioni/ibm/zvm/rc_zvm_v7r2_vpp_v1.0_it.pdf', 'report_link_en': 'https://www.ocsi.gov.it/documenti/certificazioni/ibm/zvm/cr_zvm_v7r2_vpp_v1.0_en.pdf', 'target_link': 'https://www.ocsi.gov.it/documenti/certificazioni/ibm/zvm/st_zvm_v7r2_vpp_v1.0.pdf'}.
  • 16.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6f084b9787f9a119395f7c936148a3f9ac2a30846d24ddb88abd3cff2111f88e', 'txt_hash': '03da0ddda8d75262948bbfff6a74a7189ad1ca5801702dba023419ff8dd1d032'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e889ebf867177c096eaf892c08c882c4b1b873722188a4011a582843a72ada93', 'txt_hash': '6182db56b48e90414934264f90fb4ca921799f29b60d07eb1a7a2f29f5af71a7'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 526802, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 30, '/Title': 'Certification Report "IBM z/VM Version 7 Release 2 for VPP"', '/Author': 'OCSI', '/Creator': 'Microsoft Word', '/CreationDate': "D:20220610071118+00'00'", '/ModDate': "D:20220610071118+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 997268, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 91, '/Keywords': 'Security Target, Common Criteria', '/Subject': 'IBM z/VM', '/Title': 'IBM z/VM Version 7 Release 2 for VPP Security Target (version 1.0 as of 2022-05-16)', '/Creator': 'Unknown', '/Author': 'Brian W. Hugenbruch, IBM (generated by CCTool version 2.8.4.49)', '/Producer': 'XEP 4.18 build 20100322', '/application': 'CCTool version x.y', '/Trapped': '/False', '/CreationDate': 'D:20220603064747Z', '/ModDate': 'D:20220603064747Z', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf', 'https://www-01.ibm.com/servers/resourcelink/svc0302a.nsf/pages/zVMV7R1sc246308/$file/icha1_v7r1.pdf', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf']}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'IT': {'OCSI/CERT/ATS/04/2021/RC': 30, 'OCSI/CERT/ATS/05/2020/RC': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 3}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 3, 'AGD_BVPP.1': 1, 'AGD_SVEP.1': 1}, 'ALC': {'ALC_CMC.1': 3, 'ALC_CMS.1': 3, 'ALC_TSU_EXT.1': 3, 'ALC_FLR': 1, 'ALC_BVPP.1': 1}, 'ATE': {'ATE_IND.1': 3, 'ATE_BVPP.1': 1, 'ATE_SVEP.1': 1}, 'AVA': {'AVA_VAN.1': 3}, 'ASE': {'ASE_CCL.1': 3, 'ASE_ECD.1': 3, 'ASE_INT.1': 3, 'ASE_OBJ.2': 3, 'ASE_REQ.1': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 3, 'ASE_BVPP.1': 1, 'ASE_SVEP.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.J': 1}}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 6}}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 6}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_TSU_EXT.1': 4, 'ALC_TSU_EXT.1.1': 2, 'ALC_TSU_EXT': 5, 'ALC_CMC.1': 2, 'ALC_CMS.1': 2}, 'ATE': {'ATE_IND.1': 2}, 'AVA': {'AVA_VAN.1': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.1': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_SAR.1': 6, 'FAU_STG.1': 7, 'FAU_STG_EXT.1': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG_EXT.1.1': 1, 'FAU_STG_EXT.1.2': 1, 'FAU_SAR': 1, 'FAU_GEN': 1, 'FAU_STG': 1, 'FAU_STG_EXT': 1}, 'FCS': {'FCS_CKM.1': 12, 'FCS_CKM.2': 11, 'FCS_CKM_EXT.4': 13, 'FCS_COP.1': 31, 'FCS_ENT_EXT.1': 7, 'FCS_RBG_EXT.1': 8, 'FCS_TLSS_EXT.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM_EXT.4.1': 1, 'FCS_CKM_EXT.4.2': 1, 'FCS_COP.1.1': 4, 'FCS_ENT_EXT.1.1': 1, 'FCS_ENT_EXT.1.2': 1, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1, 'FCS_TLSS_EXT': 3, 'FCS_CKM': 2, 'FCS_CKM_EXT': 1, 'FCS_RBG_EXT': 2, 'FCS_ENT_EXT': 1, 'FCS_CKM.4': 12}, 'FDP': {'FDP_HBI_EXT.1': 7, 'FDP_PPR_EXT.1': 7, 'FDP_RIP_EXT.1': 7, 'FDP_RIP_EXT.2': 8, 'FDP_VMS_EXT.1': 8, 'FDP_VNC_EXT.1': 8, 'FDP_VMS_EXT.1.1': 5, 'FDP_VNC_EXT.1.2': 3, 'FDP_HBI_EXT.1.1': 1, 'FDP_PPR_EXT.1.1': 1, 'FDP_PPR_EXT.1.2': 1, 'FDP_PPR_EXT.1.3': 1, 'FDP_RIP_EXT.1.1': 1, 'FDP_RIP_EXT.2.1': 1, 'FDP_VMS_EXT.1.2': 1, 'FDP_VMS_EXT.1.3': 1, 'FDP_VNC_EXT.1.1': 1, 'FDP_HBI_EXT': 1, 'FDP_PPR_EXT': 3, 'FDP_VMS_EXT': 1, 'FDP_VNC_EXT': 2, 'FDP_RIP_EXT': 2}, 'FIA': {'FIA_AFL_EXT.1': 9, 'FIA_PMG_EXT.1': 9, 'FIA_UAU.5': 8, 'FIA_UIA_EXT.1': 7, 'FIA_AFL_EXT.1.1': 1, 'FIA_AFL_EXT.1.2': 1, 'FIA_PMG_EXT.1.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UIA_EXT.1.1': 1, 'FIA_AFL_EXT': 1, 'FIA_PMG_EXT': 1, 'FIA_UAU': 1, 'FIA_UIA_EXT': 1}, 'FMT': {'FMT_MOF_EXT.1': 10, 'FMT_MSA_EXT.1': 9, 'FMT_SMO_EXT.1': 8, 'FMT_MOF_EXT': 3, 'FMT_MSA_EXT': 4, 'FMT_SMO_EXT': 2}, 'FPT': {'FPT_DVD_EXT.1': 8, 'FPT_EEM_EXT.1': 7, 'FPT_HAS_EXT.1': 7, 'FPT_HCL_EXT.1': 9, 'FPT_RDM_EXT.1': 9, 'FPT_TUD_EXT.1': 8, 'FPT_VDP_EXT.1': 8, 'FPT_VIV_EXT.1': 6, 'FPT_VDP_EXT.1.2': 3, 'FPT_VIV_EXT.1.2': 3, 'FPT_DVD_EXT.1.1': 1, 'FPT_EEM_EXT.1.1': 1, 'FPT_HAS_EXT.1.1': 1, 'FPT_HAS_EXT.1.2': 1, 'FPT_HCL_EXT.1.1': 1, 'FPT_HCL_EXT.1.2': 1, 'FPT_HCL_EXT.1.3': 1, 'FPT_HCL_EXT.1.4': 1, 'FPT_RDM_EXT.1.1': 1, 'FPT_RDM_EXT.1.2': 1, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 1, 'FPT_TUD_EXT.1.3': 1, 'FPT_VDP_EXT.1.1': 1, 'FPT_VIV_EXT.1.1': 1, 'FPT_HCL_EXT': 4, 'FPT_RDM_EXT': 1, 'FPT_VIV_EXT': 4, 'FPT_EEM_EXT': 1, 'FPT_HAS_EXT': 1, 'FPT_VDP_EXT': 1, 'FPT_DVD_EXT': 1, 'FPT_TUD_EXT': 1, 'FPT_STM.1': 4}, 'FTA': {'FTA_TAB.1': 8, 'FTA_TAB.1.1': 1, 'FTA_TAB': 1}, 'FTP': {'FTP_ITC_EXT.1': 11, 'FTP_UIF_EXT.1': 7, 'FTP_UIF_EXT.2': 7, 'FTP_ITC_EXT.1.1': 1, 'FTP_UIF_EXT.1.1': 1, 'FTP_UIF_EXT.2.1': 1, 'FTP_ITC_EXT': 4, 'FTP_UIF_EXT': 2}}, 'cc_claims': {'O': {'O.VM_ISOLATION': 11, 'O.VMM_INTEGRITY': 9, 'O.DOMAIN_INTEGRITY': 8, 'O.MANAGEMENT_ACCESS': 22, 'O.PATCHED_SOFTWARE': 6, 'O.VM_ENTROPY': 5, 'O.AUDIT': 9, 'O.CORRECTLY_APPLIED_CONFIGURATION': 6, 'O.RESOURCE_ALLOCATION': 5, 'O.PLATFORM_INTEGRITY': 5, 'O.CORRECTL': 1}, 'T': {'T.DATA_LEAKAGE': 4, 'T.UNAUTHORIZED_UPDATE': 3, 'T.UNAUTHORIZED_MODIFICATION': 3, 'T.USER_ERROR': 2, 'T.PLATFORM_COMPROMISE': 3, 'T.UNAUTHORIZED_ACCESS': 3, 'T.WEAK_CRYPTO': 3, 'T.UNPATCHED_SOFTWARE': 3, 'T.MISCONFIGURATION': 3, 'T.DENIAL_OF_SERVICE': 3, 'T.VMM_COMPROMISE': 3}, 'A': {'A.PLATFORM_INTEGRITY': 2, 'A.COVERT_CHANNELS': 3, 'A.PHYSICAL': 3, 'A.TRUSTED_ADMIN': 4, 'A.NON_MALICIOUS_USER': 3}, 'OE': {'OE.CONFIG': 2, 'OE.PHYSICAL': 2, 'OE.COVERT_CHANNELS': 2, 'OE.NON_MALICIOUS_USER': 2, 'OE.TRUSTED_ADMIN': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}, 'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 1, 'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1, 'KMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-256': 2, 'SHA-384': 2, 'SHA-512': 3, 'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL 1.0': 1, 'SSL 2.0': 1, 'SSL 3.0': 1, 'SSL': 13}, 'TLS': {'TLS': 50, 'TLS 1.2': 2, 'TLS 1.0': 1, 'TLS 1.1': 1}}, 'VPN': {'VPN': 1}}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RBG': 1}}, 'cipher_mode': {'CFB': {'CFB': 1}, 'OFB': {'OFB': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA256': 1}}, 'crypto_library': {'NSS': {'NSS': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channels': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 3, 'FIPS PUB 186-4': 3, 'FIPS PUB 197': 1, 'FIPS PUB 180-4': 2, 'FIPS PUB 198-1': 1, 'FIPS 186-4': 1}, 'NIST': {'NIST SP 800-38A': 1, 'NIST SP 800-57': 1}, 'RFC': {'RFC 5246': 5, 'RFC 3268': 2, 'RFC 5280': 2, 'RFC 2560': 1, 'RFC 5759': 1}, 'X509': {'X.509': 26}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to cr_zvm_v7r2_vpp_v1.0_en.pdf.
    • The st_filename property was set to st_zvm_v7r2_vpp_v1.0.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to OCSI/CERT/ATS/04/2021/RC.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['OCSI/CERT/ATS/05/2020/RC']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['OCSI/CERT/ATS/04/2017/RC', 'OCSI/CERT/ATS/05/2020/RC']}} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_BVPP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_BVPP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_SVEP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_SVEP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_BVPP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_BVPP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TSU_EXT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SVEP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_zvm_v7r2_vpp_v1.0_en.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_zvm_v7r2_vpp_v1.0.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_BVPP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_BVPP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SVEP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_SVEP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_SVEP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_BVPP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_BVPP', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IBM z/VM Version 7 Release 2 for VPP was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Operating Systems",
  "cert_link": null,
  "dgst": "0296adb563eaff34",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "OCSI/CERT/ATS/04/2021/RC",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_BVPP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_BVPP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SVEP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_SVEP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_SVEP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_BVPP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TSU_EXT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_BVPP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7",
        "2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "OCSI/CERT/ATS/05/2020/RC"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "OCSI/CERT/ATS/04/2017/RC",
          "OCSI/CERT/ATS/05/2020/RC"
        ]
      }
    },
    "scheme_data": {
      "certification_date": "2022-06-10",
      "level": "conforme a PP_BASE_VIRTUALIZATION_V1.0",
      "report_link_en": "https://www.ocsi.gov.it/documenti/certificazioni/ibm/zvm/cr_zvm_v7r2_vpp_v1.0_en.pdf",
      "report_link_it": "https://www.ocsi.gov.it/documenti/certificazioni/ibm/zvm/rc_zvm_v7r2_vpp_v1.0_it.pdf",
      "supplier": "IBM Corporation",
      "target_link": "https://www.ocsi.gov.it/documenti/certificazioni/ibm/zvm/st_zvm_v7r2_vpp_v1.0.pdf",
      "title": "IBM z/VM Version 7 Release 2 for VPP"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "IBM Corporation",
  "manufacturer_web": "https://www.ibm.com",
  "name": "IBM z/VM Version 7 Release 2 for VPP",
  "not_valid_after": "2027-06-10",
  "not_valid_before": "2022-06-10",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "cr_zvm_v7r2_vpp_v1.0_en.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "IT": {
          "OCSI/CERT/ATS/04/2021/RC": 30,
          "OCSI/CERT/ATS/05/2020/RC": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.J": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 3
        },
        "AGD": {
          "AGD_BVPP.1": 1,
          "AGD_OPE.1": 3,
          "AGD_PRE.1": 3,
          "AGD_SVEP.1": 1
        },
        "ALC": {
          "ALC_BVPP.1": 1,
          "ALC_CMC.1": 3,
          "ALC_CMS.1": 3,
          "ALC_FLR": 1,
          "ALC_TSU_EXT.1": 3
        },
        "ASE": {
          "ASE_BVPP.1": 1,
          "ASE_CCL.1": 3,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 3,
          "ASE_SPD.1": 3,
          "ASE_SVEP.1": 1,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_BVPP.1": 1,
          "ATE_IND.1": 3,
          "ATE_SVEP.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 3
          },
          "TLS": {
            "TLS": 6
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "ISO": {
          "ISO/IEC 15408": 6
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "OCSI",
      "/CreationDate": "D:20220610071118+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/ModDate": "D:20220610071118+00\u002700\u0027",
      "/Title": "Certification Report \"IBM z/VM Version 7 Release 2 for VPP\"",
      "pdf_file_size_bytes": 526802,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 30
    },
    "st_filename": "st_zvm_v7r2_vpp_v1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.COVERT_CHANNELS": 3,
          "A.NON_MALICIOUS_USER": 3,
          "A.PHYSICAL": 3,
          "A.PLATFORM_INTEGRITY": 2,
          "A.TRUSTED_ADMIN": 4
        },
        "O": {
          "O.AUDIT": 9,
          "O.CORRECTL": 1,
          "O.CORRECTLY_APPLIED_CONFIGURATION": 6,
          "O.DOMAIN_INTEGRITY": 8,
          "O.MANAGEMENT_ACCESS": 22,
          "O.PATCHED_SOFTWARE": 6,
          "O.PLATFORM_INTEGRITY": 5,
          "O.RESOURCE_ALLOCATION": 5,
          "O.VMM_INTEGRITY": 9,
          "O.VM_ENTROPY": 5,
          "O.VM_ISOLATION": 11
        },
        "OE": {
          "OE.CONFIG": 2,
          "OE.COVERT_CHANNELS": 2,
          "OE.NON_MALICIOUS_USER": 2,
          "OE.PHYSICAL": 2,
          "OE.TRUSTED_ADMIN": 1
        },
        "T": {
          "T.DATA_LEAKAGE": 4,
          "T.DENIAL_OF_SERVICE": 3,
          "T.MISCONFIGURATION": 3,
          "T.PLATFORM_COMPROMISE": 3,
          "T.UNAUTHORIZED_ACCESS": 3,
          "T.UNAUTHORIZED_MODIFICATION": 3,
          "T.UNAUTHORIZED_UPDATE": 3,
          "T.UNPATCHED_SOFTWARE": 3,
          "T.USER_ERROR": 2,
          "T.VMM_COMPROMISE": 3,
          "T.WEAK_CRYPTO": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.1": 2,
          "ALC_CMS.1": 2,
          "ALC_TSU_EXT": 5,
          "ALC_TSU_EXT.1": 4,
          "ALC_TSU_EXT.1.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 2
        },
        "AVA": {
          "AVA_VAN.1": 2
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 9,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG": 1,
          "FAU_STG.1": 7,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG_EXT": 1,
          "FAU_STG_EXT.1": 8,
          "FAU_STG_EXT.1.1": 1,
          "FAU_STG_EXT.1.2": 1
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 12,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 11,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 12,
          "FCS_CKM_EXT": 1,
          "FCS_CKM_EXT.4": 13,
          "FCS_CKM_EXT.4.1": 1,
          "FCS_CKM_EXT.4.2": 1,
          "FCS_COP.1": 31,
          "FCS_COP.1.1": 4,
          "FCS_ENT_EXT": 1,
          "FCS_ENT_EXT.1": 7,
          "FCS_ENT_EXT.1.1": 1,
          "FCS_ENT_EXT.1.2": 1,
          "FCS_RBG_EXT": 2,
          "FCS_RBG_EXT.1": 8,
          "FCS_RBG_EXT.1.1": 1,
          "FCS_RBG_EXT.1.2": 1,
          "FCS_TLSS_EXT": 3,
          "FCS_TLSS_EXT.1": 10
        },
        "FDP": {
          "FDP_HBI_EXT": 1,
          "FDP_HBI_EXT.1": 7,
          "FDP_HBI_EXT.1.1": 1,
          "FDP_PPR_EXT": 3,
          "FDP_PPR_EXT.1": 7,
          "FDP_PPR_EXT.1.1": 1,
          "FDP_PPR_EXT.1.2": 1,
          "FDP_PPR_EXT.1.3": 1,
          "FDP_RIP_EXT": 2,
          "FDP_RIP_EXT.1": 7,
          "FDP_RIP_EXT.1.1": 1,
          "FDP_RIP_EXT.2": 8,
          "FDP_RIP_EXT.2.1": 1,
          "FDP_VMS_EXT": 1,
          "FDP_VMS_EXT.1": 8,
          "FDP_VMS_EXT.1.1": 5,
          "FDP_VMS_EXT.1.2": 1,
          "FDP_VMS_EXT.1.3": 1,
          "FDP_VNC_EXT": 2,
          "FDP_VNC_EXT.1": 8,
          "FDP_VNC_EXT.1.1": 1,
          "FDP_VNC_EXT.1.2": 3
        },
        "FIA": {
          "FIA_AFL_EXT": 1,
          "FIA_AFL_EXT.1": 9,
          "FIA_AFL_EXT.1.1": 1,
          "FIA_AFL_EXT.1.2": 1,
          "FIA_PMG_EXT": 1,
          "FIA_PMG_EXT.1": 9,
          "FIA_PMG_EXT.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.5": 8,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UIA_EXT": 1,
          "FIA_UIA_EXT.1": 7,
          "FIA_UIA_EXT.1.1": 1
        },
        "FMT": {
          "FMT_MOF_EXT": 3,
          "FMT_MOF_EXT.1": 10,
          "FMT_MSA_EXT": 4,
          "FMT_MSA_EXT.1": 9,
          "FMT_SMO_EXT": 2,
          "FMT_SMO_EXT.1": 8
        },
        "FPT": {
          "FPT_DVD_EXT": 1,
          "FPT_DVD_EXT.1": 8,
          "FPT_DVD_EXT.1.1": 1,
          "FPT_EEM_EXT": 1,
          "FPT_EEM_EXT.1": 7,
          "FPT_EEM_EXT.1.1": 1,
          "FPT_HAS_EXT": 1,
          "FPT_HAS_EXT.1": 7,
          "FPT_HAS_EXT.1.1": 1,
          "FPT_HAS_EXT.1.2": 1,
          "FPT_HCL_EXT": 4,
          "FPT_HCL_EXT.1": 9,
          "FPT_HCL_EXT.1.1": 1,
          "FPT_HCL_EXT.1.2": 1,
          "FPT_HCL_EXT.1.3": 1,
          "FPT_HCL_EXT.1.4": 1,
          "FPT_RDM_EXT": 1,
          "FPT_RDM_EXT.1": 9,
          "FPT_RDM_EXT.1.1": 1,
          "FPT_RDM_EXT.1.2": 1,
          "FPT_STM.1": 4,
          "FPT_TUD_EXT": 1,
          "FPT_TUD_EXT.1": 8,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1,
          "FPT_VDP_EXT": 1,
          "FPT_VDP_EXT.1": 8,
          "FPT_VDP_EXT.1.1": 1,
          "FPT_VDP_EXT.1.2": 3,
          "FPT_VIV_EXT": 4,
          "FPT_VIV_EXT.1": 6,
          "FPT_VIV_EXT.1.1": 1,
          "FPT_VIV_EXT.1.2": 3
        },
        "FTA": {
          "FTA_TAB": 1,
          "FTA_TAB.1": 8,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC_EXT": 4,
          "FTP_ITC_EXT.1": 11,
          "FTP_ITC_EXT.1.1": 1,
          "FTP_UIF_EXT": 2,
          "FTP_UIF_EXT.1": 7,
          "FTP_UIF_EXT.1.1": 1,
          "FTP_UIF_EXT.2": 7,
          "FTP_UIF_EXT.2.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CFB": {
          "CFB": 1
        },
        "OFB": {
          "OFB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "NSS": {
          "NSS": 1
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 13,
            "SSL 1.0": 1,
            "SSL 2.0": 1,
            "SSL 3.0": 1
          },
          "TLS": {
            "TLS": 50,
            "TLS 1.0": 1,
            "TLS 1.1": 1,
            "TLS 1.2": 2
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-256": 2,
            "SHA-384": 2,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 1
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "side-channels": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 3,
          "FIPS 186-4": 1,
          "FIPS PUB 180-4": 2,
          "FIPS PUB 186-4": 3,
          "FIPS PUB 197": 1,
          "FIPS PUB 198-1": 1
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-57": 1
        },
        "RFC": {
          "RFC 2560": 1,
          "RFC 3268": 2,
          "RFC 5246": 5,
          "RFC 5280": 2,
          "RFC 5759": 1
        },
        "X509": {
          "X.509": 26
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1,
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA256": 1
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Brian W. Hugenbruch, IBM (generated by CCTool version 2.8.4.49)",
      "/CreationDate": "D:20220603064747Z",
      "/Creator": "Unknown",
      "/Keywords": "Security Target, Common Criteria",
      "/ModDate": "D:20220603064747Z",
      "/Producer": "XEP 4.18 build 20100322",
      "/Subject": "IBM z/VM",
      "/Title": "IBM z/VM Version 7 Release 2 for VPP Security Target (version 1.0 as of 2022-05-16)",
      "/Trapped": "/False",
      "/application": "CCTool version x.y",
      "pdf_file_size_bytes": 997268,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf",
          "http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf",
          "http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf",
          "https://www-01.ibm.com/servers/resourcelink/svc0302a.nsf/pages/zVMV7R1sc246308/$file/icha1_v7r1.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 91
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ep_sv_v1.0.pdf",
        "pp_name": "Extended Package for Server Virtualization Version 1.0"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_base_virtualization_v1.0.pdf",
        "pp_name": "Protection Profile for Virtualization Version 1.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_zvm_v7r2_vpp_v1.0_en.pdf",
  "scheme": "IT",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_zvm_v7r2_vpp_v1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6f084b9787f9a119395f7c936148a3f9ac2a30846d24ddb88abd3cff2111f88e",
      "txt_hash": "03da0ddda8d75262948bbfff6a74a7189ad1ca5801702dba023419ff8dd1d032"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e889ebf867177c096eaf892c08c882c4b1b873722188a4011a582843a72ada93",
      "txt_hash": "6182db56b48e90414934264f90fb4ca921799f29b60d07eb1a7a2f29f5af71a7"
    }
  },
  "status": "active"
}