IBM z/OS Version 2 Release 5

CSV information

Status active
Valid from 29.09.2025
Valid until 29.09.2030
Scheme 🇮🇹 IT
Manufacturer IBM Corporation
Category Operating Systems
Security level EAL4+, ALC_FLR.3

Heuristics summary

Certificate ID: OCSI/CERT/ATS/07/2024/RC

Certificate

Extracted keywords

Security level
EAL4+, EAL2, EAL4
Security Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLR
Certificates
OCSI/CERT/ATS/07/2024/RC

Standards
ISO/IEC 15408

File metadata

Title cr_zOS_v2.5_EAL4+_v1.0_en.pdf
Author Tiziano Inzerilli
Creation date D:20250930165102+02'00'
Modification date D:20250930165102+02'00'
Pages 2
Producer Microsoft: Print To PDF

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES, TDES
Asymmetric Algorithms
ECC
Hash functions
SHA-1, SHA256, SHA-256, SHA-384
Schemes
Key Exchange
Protocols
SSH, SSL, TLS, TLS v1.3, IKE

Security level
EAL4+, EAL2, EAL4, EAL4 augmented
Claims
O.J
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Certificates
OCSI/CERT/ATS/07/2024/RC
Evaluation facilities
atsec

Standards
ISO/IEC 15408, x.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Author Tiziano Inzerilli
Creation date D:20250929095009+02'00'
Modification date D:20250929095009+02'00'
Pages 37
Creator Microsoft® Word per Microsoft 365
Producer Microsoft® Word per Microsoft 365

Security target

Extracted keywords

Symmetric Algorithms
AES, AES-256, DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDHE, ECDSA, ECC, DH, DSA
Hash functions
SHA-256, SHA-384, SHA-512, SHA256, SHA384, SHA512, SHA-2
Schemes
MAC, Key Exchange
Protocols
SSH, SSHv2, SSL, SSL 2.0, SSL 3.0, TLS, TLS 1.2, TLS 1.3, TLS 1.0, TLS 1.1, TLSv1.0, TLSv1.1, DTLS, IKE, IKEv2, IPsec
Randomness
TRNG, DRBG, RBG
Elliptic Curves
P-384, P-521, secp384r1, secp521r1
Block cipher modes
ECB, CBC, CTR, GCM, XTS
TLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

Trusted Execution Environments
SE

Security level
EAL4, EAL4 augmented
Claims
O.ACCOUNTABILITY, O.INTEGRITY, O.MANAGEMENT, O.PROTECTED_STORAGE, O.PROTECTED_COMMS, O.AUDITING, O.DISCRETIONARY, O.IA, O.I_A, O.IA_MULTIPLE, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.LOCAL_ATTACK, T.LIMITED_PHYSICAL_ACCESS, T.ACCESS, T.IA, A.PLATFORM, A.PROPER_USER, A.PROPER_ADMIN, A.PHYSICAL, A.PEER, A.CONNECT, OE.PLATFORM, OE.PROPER_USER, OE.PROPER_ADMIN, OE.REMOTE, OE.PHYSICAL, OE.RECOVER, OE.TRUSTED
Security Assurance Requirements (SAR)
ALC_FLR.3
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FCS_TLS_PLUS, FCS_TLS_PLUS.1, FCS_TLSC_PLUS, FCS_TLSC_PLUS.1, FCS_TLSC_PLUS.2, FCS_TLSC_PLUS.5, FCS_TLSS_PLUS, FCS_TLSS_PLUS.1, FCS_TLSS_PLUS.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.4, FCS_COP, FCS_RBG_EXT.1, FCS_STO_EXT.1, FCS_SSH_EXT.1, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_TLS_PLUS.1.1, FCS_COP.1, FCS_SSH_EXT, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_STO_EXT.1.1, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FCS_SSH_EXT.1.8, FCS_SSHC_EXT.1.1, FCS_SSHS_EXT.1.1, FCS_CKM.4, FDP_ACF_EXT.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.2, FDP_ACF_EXT.1.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.7, FIA_UID.1, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MOF_EXT.1, FMT_SMF_EXT.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMR.1, FMT_MOF_EXT.1.1, FMT_SMF_EXT.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FPT_ACF_EXT.1, FPT_ASLR_EXT.1, FPT_SBOP_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_STM.1, FPT_ACF_EXT.1.1, FPT_ACF_EXT.1.2, FPT_ASLR_EXT.1.1, FPT_SBOP_EXT.1.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_STM.1.1, FTA_TAB.1, FTA_SSL.1, FTA_SSL.2, FTA_TAB.1.1, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTP_ITC_EXT.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC_EXT.1.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Protection profiles
BSI-CC-PP-0067

Side-channel analysis
side channels
Certification process
out of scope, The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the

Standards
FIPS PUB 186-4, FIPS 186-4, FIPS186-4, NIST SP 800-38E, NIST SP 800-38A, NIST SP 800-38D, NIST SP 800-57, NIST SP 800-90A, PKCS#11, PKCS#1, RFC5246, RFC8446, RFC4253, RFC5289, RFC6125, RFC 5280, RFC 6960, RFC 8603, RFC 6066, RFC 6961, RFC4301, RFC4302, RFC4303, RFC4304, RFC4308, RFC4754, RFC4809, RFC4868, RFC3602, RFC3566, RFC4753, RFC5114, RFC4106, RFC4252, RFC5656, RFC4344, RFC5647, RFC6668, RFC 4251, RFC5280, RFC6960, RFC 4252, RFC4869, RFC4835, RFC5996, RFC4307, RFC4945, RFC 5656, X.509

File metadata

Title Security Target for z/OS Version 2 Release 5 (version as of )
Subject IBM z/OS Version 2 Release 5
Keywords operating system, access control, identification, authentication, audit, object reuse
Author Mark Nelson, IBM
Creation date D:20250627095527+02'00'
Pages 142
Creator Generated by CCTool version 3.0.1
Producer Apache FOP Version SVN

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

OCSI/CERT/ATS/07/2024/RC

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Operating Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FP_cr_zOS_v2.5_eal+_v1.0_en.pdf",
  "dgst": "f19e20935acc3db2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "OCSI/CERT/ATS/07/2024/RC",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2",
        "5"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "IBM Corporation",
  "manufacturer_web": "https://www.ibm.com",
  "name": "IBM z/OS Version 2 Release 5",
  "not_valid_after": "2030-09-29",
  "not_valid_before": "2025-09-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "FP_cr_zOS_v2.5_eal _v1.0_en.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "IT": {
          "OCSI/CERT/ATS/07/2024/RC": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 2,
          "ALC_FLR.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL4": 2,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Tiziano Inzerilli",
      "/CreationDate": "D:20250930165102+02\u002700\u0027",
      "/ModDate": "D:20250930165102+02\u002700\u0027",
      "/Producer": "Microsoft: Print To PDF",
      "/Title": "cr_zOS_v2.5_EAL4+_v1.0_en.pdf",
      "pdf_file_size_bytes": 378071,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "cr_zOS_v2.5_eal _v1.0_en.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          }
        }
      },
      "cc_cert_id": {
        "IT": {
          "OCSI/CERT/ATS/07/2024/RC": 37
        }
      },
      "cc_claims": {
        "O": {
          "O.J": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR": 4,
          "ALC_FLR.3": 6,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 4,
          "EAL4": 10,
          "EAL4 augmented": 3,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 2
        },
        "SSH": {
          "SSH": 6
        },
        "TLS": {
          "SSL": {
            "SSL": 2
          },
          "TLS": {
            "TLS": 11,
            "TLS v1.3": 1
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 5
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-256": 2,
            "SHA-384": 1,
            "SHA256": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4
        },
        "X509": {
          "x.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Tiziano Inzerilli",
      "/CreationDate": "D:20250929095009+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word per Microsoft 365",
      "/ModDate": "D:20250929095009+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word per Microsoft 365",
      "pdf_file_size_bytes": 663673,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "https://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    },
    "st_filename": "st_zos_v2r5_eal4 _2.17.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDHE": 5
          },
          "ECDSA": {
            "ECDSA": 16
          }
        },
        "FF": {
          "DH": {
            "DH": 2
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECT": 5,
          "A.PEER": 8,
          "A.PHYSICAL": 4,
          "A.PLATFORM": 5,
          "A.PROPER_ADMIN": 6,
          "A.PROPER_USER": 5
        },
        "O": {
          "O.ACCOUNTABILITY": 12,
          "O.AUDITING": 15,
          "O.DISCRETIONARY": 14,
          "O.IA": 21,
          "O.IA_MULTIPLE": 1,
          "O.INTEGRITY": 23,
          "O.I_A": 1,
          "O.MANAGEMENT": 25,
          "O.PROTECTED_COMMS": 28,
          "O.PROTECTED_STORAGE": 10
        },
        "OE": {
          "OE.PHYSICAL": 4,
          "OE.PLATFORM": 4,
          "OE.PROPER_ADMIN": 4,
          "OE.PROPER_USER": 4,
          "OE.RECOVER": 3,
          "OE.REMOTE": 4,
          "OE.TRUSTED": 6
        },
        "T": {
          "T.ACCESS": 21,
          "T.IA": 13,
          "T.LIMITED_PHYSICAL_ACCESS": 4,
          "T.LOCAL_ATTACK": 3,
          "T.NETWORK_ATTACK": 11,
          "T.NETWORK_EAVESDROP": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0067": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 5,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 14,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 9,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 7,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 7,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 9,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 6,
          "FAU_STG.3.1": 1,
          "FAU_STG.4": 7,
          "FAU_STG.4.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 19,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 8,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 7,
          "FCS_CKM_EXT.4": 7,
          "FCS_CKM_EXT.4.1": 1,
          "FCS_CKM_EXT.4.2": 1,
          "FCS_COP": 46,
          "FCS_COP.1": 10,
          "FCS_COP.1.1": 1,
          "FCS_RBG_EXT.1": 8,
          "FCS_RBG_EXT.1.1": 1,
          "FCS_RBG_EXT.1.2": 1,
          "FCS_SSHC_EXT.1": 7,
          "FCS_SSHC_EXT.1.1": 1,
          "FCS_SSHS_EXT.1": 7,
          "FCS_SSHS_EXT.1.1": 1,
          "FCS_SSH_EXT": 1,
          "FCS_SSH_EXT.1": 7,
          "FCS_SSH_EXT.1.1": 1,
          "FCS_SSH_EXT.1.2": 1,
          "FCS_SSH_EXT.1.3": 1,
          "FCS_SSH_EXT.1.4": 1,
          "FCS_SSH_EXT.1.5": 1,
          "FCS_SSH_EXT.1.6": 1,
          "FCS_SSH_EXT.1.7": 1,
          "FCS_SSH_EXT.1.8": 1,
          "FCS_STO_EXT.1": 7,
          "FCS_STO_EXT.1.1": 1,
          "FCS_TLSC_PLUS": 5,
          "FCS_TLSC_PLUS.1": 19,
          "FCS_TLSC_PLUS.2": 15,
          "FCS_TLSC_PLUS.5": 15,
          "FCS_TLSS_PLUS": 4,
          "FCS_TLSS_PLUS.1": 19,
          "FCS_TLSS_PLUS.2": 19,
          "FCS_TLS_PLUS": 3,
          "FCS_TLS_PLUS.1": 12,
          "FCS_TLS_PLUS.1.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 33,
          "FDP_ACC.1.1": 3,
          "FDP_ACF.1": 27,
          "FDP_ACF.1.1": 3,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 3,
          "FDP_ACF.1.4": 3,
          "FDP_ACF_EXT.1": 7,
          "FDP_ACF_EXT.1.1": 1,
          "FDP_IFC.1": 3,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 6,
          "FDP_RIP.2": 9,
          "FDP_RIP.2.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 8,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 12,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 10,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 7,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 10,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 7,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF_EXT.1": 7,
          "FMT_MOF_EXT.1.1": 1,
          "FMT_MSA.1": 27,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.3": 27,
          "FMT_MSA.3.1": 3,
          "FMT_MSA.3.2": 3,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 3,
          "FMT_SMF_EXT.1": 9,
          "FMT_SMF_EXT.1.1": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ACF_EXT.1": 7,
          "FPT_ACF_EXT.1.1": 1,
          "FPT_ACF_EXT.1.2": 1,
          "FPT_ASLR_EXT.1": 7,
          "FPT_ASLR_EXT.1.1": 1,
          "FPT_SBOP_EXT.1": 7,
          "FPT_SBOP_EXT.1.1": 1,
          "FPT_STM.1": 9,
          "FPT_STM.1.1": 1,
          "FPT_TST_EXT.1": 7,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TUD_EXT.1": 7,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.2": 7,
          "FPT_TUD_EXT.2.1": 1,
          "FPT_TUD_EXT.2.2": 1
        },
        "FTA": {
          "FTA_SSL.1": 7,
          "FTA_SSL.1.1": 1,
          "FTA_SSL.1.2": 1,
          "FTA_SSL.2": 7,
          "FTA_SSL.2.1": 1,
          "FTA_SSL.2.2": 1,
          "FTA_TAB.1": 7,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 9,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_ITC_EXT.1": 9,
          "FTP_ITC_EXT.1.1": 1,
          "FTP_TRP.1": 7,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 5
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 10,
          "IKEv2": 10
        },
        "IPsec": {
          "IPsec": 9
        },
        "SSH": {
          "SSH": 56,
          "SSHv2": 2
        },
        "TLS": {
          "DTLS": {
            "DTLS": 1
          },
          "SSL": {
            "SSL": 21,
            "SSL 2.0": 2,
            "SSL 3.0": 2
          },
          "TLS": {
            "TLS": 89,
            "TLS 1.0": 2,
            "TLS 1.1": 2,
            "TLS 1.2": 7,
            "TLS 1.3": 7,
            "TLSv1.0": 1,
            "TLSv1.1": 1
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 7
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-384": 4,
          "P-521": 4,
          "secp384r1": 8,
          "secp521r1": 8
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 4,
            "SHA-256": 5,
            "SHA-384": 4,
            "SHA-512": 6,
            "SHA256": 1,
            "SHA384": 2,
            "SHA512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 3
        },
        "RNG": {
          "RBG": 1
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "side channels": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 186-4": 1,
          "FIPS PUB 186-4": 4,
          "FIPS186-4": 3
        },
        "NIST": {
          "NIST SP 800-38A": 3,
          "NIST SP 800-38D": 2,
          "NIST SP 800-38E": 2,
          "NIST SP 800-57": 1,
          "NIST SP 800-90A": 2
        },
        "PKCS": {
          "PKCS#1": 1,
          "PKCS#11": 4
        },
        "RFC": {
          "RFC 4251": 1,
          "RFC 4252": 1,
          "RFC 5280": 2,
          "RFC 5656": 1,
          "RFC 6066": 1,
          "RFC 6960": 1,
          "RFC 6961": 1,
          "RFC 8603": 1,
          "RFC3566": 3,
          "RFC3602": 3,
          "RFC4106": 3,
          "RFC4252": 3,
          "RFC4253": 4,
          "RFC4301": 4,
          "RFC4302": 3,
          "RFC4303": 3,
          "RFC4304": 4,
          "RFC4307": 2,
          "RFC4308": 4,
          "RFC4344": 2,
          "RFC4753": 4,
          "RFC4754": 5,
          "RFC4809": 4,
          "RFC4835": 2,
          "RFC4868": 5,
          "RFC4869": 2,
          "RFC4945": 2,
          "RFC5114": 4,
          "RFC5246": 7,
          "RFC5280": 6,
          "RFC5289": 10,
          "RFC5647": 3,
          "RFC5656": 10,
          "RFC5996": 2,
          "RFC6125": 5,
          "RFC6668": 3,
          "RFC6960": 3,
          "RFC8446": 12
        },
        "X509": {
          "X.509": 21
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 15,
            "AES-256": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 3,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 5,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 5
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Mark Nelson, IBM",
      "/CreationDate": "D:20250627095527+02\u002700\u0027",
      "/Creator": "Generated by CCTool version 3.0.1",
      "/Keywords": "operating system, access control, identification, authentication, audit, object reuse",
      "/Producer": "Apache FOP Version SVN",
      "/Subject": "IBM z/OS Version 2 Release 5",
      "/Title": "Security Target for z/OS Version 2 Release 5 (version  as of )",
      "pdf_file_size_bytes": 1030215,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ietf.org/rfc/rfc4869.txt",
          "http://www.ietf.org/rfc/rfc3602.txt",
          "http://www.ietf.org/rfc/rfc5114.txt",
          "http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf",
          "https://www.niap-ccevs.org/protectionprofiles/459",
          "http://www.ietf.org/rfc/rfc4308.txt",
          "http://www.ietf.org/rfc/rfc6125.txt",
          "http://www.ietf.org/rfc/rfc4301.txt",
          "http://www.ietf.org/rfc/rfc4302.txt",
          "http://www.ietf.org/rfc/rfc4344.txt",
          "http://www.ietf.org/rfc/rfc4106.txt",
          "http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf",
          "https://www.niap-ccevs.org/protectionprofiles/469",
          "http://www.ietf.org/rfc/rfc4253.txt",
          "http://www.ietf.org/rfc/rfc3566.txt",
          "http://www.ietf.org/rfc/rfc6960.txt",
          "http://www.ietf.org/rfc/rfc8446.txt",
          "http://www.ietf.org/rfc/rfc4753.txt",
          "http://www.ietf.org/rfc/rfc4868.txt",
          "http://www.ietf.org/rfc/rfc5289.txt",
          "http://www.ietf.org/rfc/rfc4304.txt",
          "http://www.ietf.org/rfc/rfc5647.txt",
          "http://www.ietf.org/rfc/rfc4754.txt",
          "http://www.ietf.org/rfc/rfc6668.txt",
          "http://www.ietf.org/rfc/rfc5280.txt",
          "http://www.ietf.org/rfc/rfc4945.txt",
          "http://www.ietf.org/rfc/rfc4809.txt",
          "http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf",
          "http://www.ietf.org/rfc/rfc5656.txt",
          "http://www.ietf.org/rfc/rfc4835.txt",
          "http://www.ietf.org/rfc/rfc4307.txt",
          "http://www.ietf.org/rfc/rfc4252.txt",
          "http://www.ietf.org/rfc/rfc4303.txt",
          "http://www.ietf.org/rfc/rfc5246.txt",
          "https://csrc.nist.gov/pubs/fips/186-4/final",
          "http://www.ietf.org/rfc/rfc5996.txt"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 142
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_zOS_v2.5_eal+_v1.0_en.pdf",
  "scheme": "IT",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.3",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_zos_v2r5_eal4+_2.17.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "84255d4c579c74021e8beaac647e1e39115dceabbfb9586b32b9726aaa16ddf5",
      "txt_hash": "23e333363d780cfa7df6fae48593f5d17cb6b29520308caefb925e5c3cc6a6de"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "357e6dcf8461ed1f81adc110722139419afd0c63e931b880bf5c9e359c68914a",
      "txt_hash": "21bbdef3080581f29b0a83d2dd10bce4c5d29f97f620166388da4b233098ef5b"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "1cd5989f745d37bfa1a99ce40bba1c840ee2fbac06323ee1ae8f2e181a6d7ec2",
      "txt_hash": "f323cbd7a14f03b288bce695ccb92c4daf6bd9bbd1f00a52a8e5cfcf1f376899"
    }
  },
  "status": "active"
}