BREACH+ v2.0

CSV information ?

Status active
Valid from 02.09.2024
Valid until 02.09.2027
Scheme 🇶🇦 QA
Manufacturer Cytomate Solutions & Services
Category Other Devices and Systems
Security level EAL1

Heuristics summary ?

Certificate ID: QCCS-CERT-C003-001-2024

Certificate ?

Extracted keywords

Claims
A.S
Certificates
QCCS-CERT-C003-001-2024
Evaluation facilities
BEAM Teknoloji

File metadata

Title [CB-4-CRT-QCCS]-CC-Certificate-Mz
Creation date D:20240827115429+03'00'
Modification date D:20240916093110+03'00'
Pages 1
Creator Adobe Illustrator 27.9 (Macintosh)
Producer Adobe PDF library 17.00

Certification report ?

Extracted keywords

Security level
EAL1, EAL 1
Certificates
QCCS-CERT-C003-001-2024
Evaluation facilities
BEAM Teknoloji

Standards
ISO/IEC17065, ISO/IEC 17065, ISO/IEC15408, ISO/IEC 18045

File metadata

Title Certification Report
Subject Report
Creation date D:20240911134718+03'00'
Modification date D:20240911134844+03'00'
Pages 22
Creator Acrobat PDFMaker 23 for Word
Producer Adobe PDF Library 23.6.156

Security target ?

Extracted keywords

Schemes
MAC

Vendor
Microsoft

Security level
EAL1
Claims
O.AUTH, O.AUDIT, O.MGMT, O.LEGIT_USE, O.MFA, O.SAFE_EXEC, OE.NETWORK, OE.SEC_ENV, OE.CRED, OE.ADMIN
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_INT.1, ASE_ECD.1, ASE_REQ.1, ASE_OBJ.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_STG.1, FAU_STG.1.2, FAU_GEN, FAU_SAR, FAU_STG, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FDP_ACC, FDP_ACF, FDP_ACF.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_UAU.5.2, FIA_ATD.1, FIA_UAU.2, FIA_AFL.1, FIA_SOS.1, FIA_UAU.5, FIA_ATD, FIA_AFL, FIA_UID, FIA_UAU, FIA_SOS, FIA_UID.2, FIA_UID.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UID.2.1, FMT_MSA.1, FMT_MSA, FMT_SMF, FMT_SMR, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_ITT.1, FPT_STM.1, FPT_ITT, FPT_STM, FPT_ITT.1.1, FPT_STM.1.1, FTA_SSL, FTA_TSE, FTA_SSL.3, FTA_SSL.4, FTA_TSE.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TSE.1.1

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title BREACH+ V.2.0
Subject SECURITY TARGET V.1.4
Author test
Creation date D:20240716152340+03'00'
Modification date D:20240716152340+03'00'
Pages 33
Creator Microsoft® Word Microsoft 365 için
Producer Microsoft® Word Microsoft 365 için

Heuristics ?

Certificate ID: QCCS-CERT-C003-001-2024

Extracted SARs

ALC_CMC.1, ATE_IND.1, ASE_TSS.1, AGD_OPE.1, ASE_REQ.1, AGD_PRE.1, ASE_CCL.1, ADV_FSP.1, ALC_CMS.1, ASE_INT.1, ASE_OBJ.1, ASE_ECD.1, AVA_VAN.1

References ?

No references are available for this certificate.

Updates ?

  • 30.10.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name BREACH+ v2.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CB-4-CRT-QCCS-CC-Certificate-%20C003.pdf",
  "dgst": "10d4b608e98b364e",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "QCCS-CERT-C003-001-2024",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Cytomate Solutions \u0026 Services",
  "manufacturer_web": "https://www.cytomate.net/",
  "name": "BREACH+ v2.0",
  "not_valid_after": "2027-09-02",
  "not_valid_before": "2024-09-02",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "CB-4-CRT-QCCS-CC-Certificate- C003.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "QA": {
          "QCCS-CERT-C003-001-2024": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.S": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BEAM": {
          "BEAM Teknoloji": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240827115429+03\u002700\u0027",
      "/Creator": "Adobe Illustrator 27.9 (Macintosh)",
      "/ModDate": "D:20240916093110+03\u002700\u0027",
      "/Producer": "Adobe PDF library 17.00",
      "/Title": "[CB-4-CRT-QCCS]-CC-Certificate-Mz",
      "pdf_file_size_bytes": 2157985,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 1
    },
    "report_filename": "[CB-4-RPT-QCCS]-Certification-Report-C003 v1.1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "QA": {
          "QCCS-CERT-C003-001-2024": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 1": 2,
          "EAL1": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BEAM": {
          "BEAM Teknoloji": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2,
          "ISO/IEC17065": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Category": "Public",
      "/ClassificationContentMarkingFooterFontProps": "#000000,10,Calibri",
      "/ClassificationContentMarkingFooterShapeIds": "8,9,a,b,c,d,e,f,10",
      "/ClassificationContentMarkingFooterText": "Classified_Public",
      "/Comments": "06.08.2024",
      "/Company": "Ministry of Transport \u0026 Communications",
      "/ContentTypeId": "0x010100BE8EE9D22F12584ABFB929336815436E",
      "/CreationDate": "D:20240911134718+03\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 for Word",
      "/Keywords": "",
      "/MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_ActionId": "0390e8bc-285f-40d1-87c3-162fac4e0789",
      "/MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_ContentBits": "2",
      "/MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_Enabled": "true",
      "/MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_Method": "Privileged",
      "/MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_Name": "ba1c3d61-d25e-4220-be73-e1cfaa29bdb8",
      "/MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_SetDate": "2022-04-12T07:01:00Z",
      "/MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_SiteId": "75f5c750-9567-45b1-820b-cba711750bf8",
      "/Manager": "",
      "/ModDate": "D:20240911134844+03\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.6.156",
      "/Product Code": "C002",
      "/SourceModified": "D:20240911104654",
      "/Subject": "Report",
      "/TOE Name": "Huawei NetEngine 8000 M14 Routers\u0027 Software",
      "/TOE Version": "V800R021C00, patch version V800R021C00SPC100",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 389633,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    },
    "st_filename": "Security-Target-(ST)-V.1.4-Breach .pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AUDIT": 1,
          "O.AUTH": 1,
          "O.LEGIT_USE": 1,
          "O.MFA": 1,
          "O.MGMT": 1,
          "O.SAFE_EXEC": 1
        },
        "OE": {
          "OE.ADMIN": 1,
          "OE.CRED": 1,
          "OE.NETWORK": 1,
          "OE.SEC_ENV": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 5
        },
        "AGD": {
          "AGD_OPE.1": 3,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.1": 1,
          "ASE_REQ.1": 3,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_GEN.1": 7,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 3,
          "FAU_GEN.2.1": 1,
          "FAU_SAR": 1,
          "FAU_SAR.1": 4,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 2,
          "FDP_ACC.1": 8,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 5,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 2
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 3,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 6,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 2,
          "FIA_UID": 1,
          "FIA_UID.1": 9,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA": 2,
          "FMT_MSA.1": 7,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 7,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 9,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT": 1,
          "FPT_ITT.1": 4,
          "FPT_ITT.1.1": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1
        },
        "FTA": {
          "FTA_SSL": 2,
          "FTA_SSL.3": 4,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 4,
          "FTA_SSL.4.1": 1,
          "FTA_TSE": 1,
          "FTA_TSE.1": 4,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "test",
      "/CreationDate": "D:20240716152340+03\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word Microsoft 365 i\u00e7in",
      "/ModDate": "D:20240716152340+03\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word Microsoft 365 i\u00e7in",
      "/Subject": "SECURITY TARGET V.1.4",
      "/Title": "BREACH+ \nV.2.0",
      "pdf_file_size_bytes": 636176,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://apt.cytomate.net/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 33
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CB-4-RPT-QCCS]-Certification-Report-C003%20v1.1.pdf",
  "scheme": "QA",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security-Target-(ST)-V.1.4-Breach+.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "061bce003397359ef07ab66bd9c5547dfc128d46b2978ed31d6ba22a5688475e",
      "txt_hash": "8e249ea540ab62c888c2c16c543ddc5ca6ab9e656cb955c8cfbf9390c0e6b7f9"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f30fe18dafd1f9f8403b67c5c7d35954dfb74dfca8b61e0209642fd4d43126a2",
      "txt_hash": "68edafe3e92c2d6bda4e53b631ef161ab8204b2836edfb356f5871d35d149d59"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "34b182286f9cad148e3328f8ac7d466845a416a9d3ecc5e2d3a8dad0e7385411",
      "txt_hash": "5499ea2be26dda3fb8434d2afb96ddd0aefcbfad4709bc50865a3d7e21f2cbb8"
    }
  },
  "status": "active"
}