CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
CSV information ?
Status | active |
---|---|
Valid from | 23.10.2020 |
Valid until | 23.10.2025 |
Scheme | 🇲🇾 MY |
Manufacturer | Pernec Integrated Network Systems Sdn. Bhd. |
Category | Other Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL2File metadata
Title | SISCB Print20110509451 |
---|---|
Creation date | D:20201105094524+08'00' |
Modification date | D:20201105125157+08'00' |
Pages | 1 |
Creator | ISCB Printer |
Producer | KONICA MINOLTA bizhub C360i |
Certification report ?
Extracted keywords
Hash functions
MD5Protocols
SSL, TLSSecurity level
EAL2, EAL 2Claims
A.PLATFORM, A.ADMIN, A.USER, A.TIMESTAMP, A.PHYSICALCertificates
ISCB-5-RPT-C112-CR-v1, ISCB-3-RPT-C112-CR-v1Standards
ISO/IEC15408, ISO/IEC 18045File metadata
Creation date | D:20201111142929Z00'00' |
---|---|
Modification date | D:20201111142929Z00'00' |
Pages | 38 |
Creator | Word |
Producer | macOS Version 10.15.7 (Build 19H2) Quartz PDFContext |
Security target ?
Extracted keywords
Hash functions
MD5Protocols
TLS, TLS v1.2Vendor
STMSecurity level
EAL2Claims
O.CONFIG, O.USER, O.SEC_COM, O.ACCESS, O.MANAGE, T.CONFIG, T.MASQUERADE, T.UNAUTHORISED_AC, T.AUDIT_COMPROMISE, A.PLATFORM, A.ADMIN, A.USER, A.TIMESTAMP, A.PHYSICAL, OE.USER, OE.TOE_ACCESS, OE.PLATFORM, OE.ADMIN, OE.TIMESTAMP, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FDP_IFF, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FIA_ATD, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Certification process
out of Scope, The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation, within the TOE boundary). The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation. In order to comply with the evaluated configuration, the following hardware andFile metadata
Title | CYSECA Security Target |
---|---|
Subject | SECURITY TARGET |
Author | Securelytics |
Creation date | D:20200929083327+00'00' |
Modification date | D:20200929083327+00'00' |
Pages | 41 |
Creator | Microsoft Word |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2Similar certificates
Name | Certificate ID | |
---|---|---|
xPortalNet HS Server version 2.0.0.2, xPortalNet HS Client version 2.0.0.2 and Xp-GLS5100 Controllers | ISCB-3-RPT-C092-CR-v1 | Compare |
Scheme data ?
Cert No | 2020-007-C112 | |
---|---|---|
Developer | Pernec Integrated Network Systems Sdn Bhd | |
Level | EAL2 | |
Product | CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12 | |
Certification Date | 23.10.2020 | |
Expiration Date | 23.10.2025 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/133 | |
Enhanced | ||
Cert Id | C112 | |
Product | CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12 | |
Developer | 21, Jalan Setiawangsa 8,Taman Setiawangsa,54200 Kuala Lumpur,Wilayah Persekutuan Kuala Lumpur Tel: 03-4259 6000Email: [email protected]: https://www.pernec.com.my/ | |
Category | Other Devices and Systems | |
Type | Other Devices and Systems | |
Scope | The Target of Evaluation (TOE) is CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 (TOE Server) and CYSECA Endpoint Application Control Client v1.1.12 (TOE Client). The TOE is an endpoint application control allows organization to enhance the defences against executing unwanted or malicious application on critical endpoint computer. TOE comprise of server and client components that can be operated in one or more instance. TOE is designed with granular policy, extensive application catalogue as well as, real-time monitoring and defences, CYSECA reduces the risk of threat exposures on client. The TOE is designed for Application control implementation for client and allows only selected files or applications that are allowed/whitelisted to be executed while others are being stopped. | |
Assurance Level | EAL2 | |
Certification Date | 23.10.2020 | |
Expiration Date | 23.10.2025 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/CYSECA_Security_Target_v1.0.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/ISCB-5-RPT-C112-CR-v1.pdf | |
Status | Valid |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2020-10-23', 'expiration_date': '2025-10-23', 'enhanced': {'__update__': {'developer': '21, Jalan Setiawangsa 8,Taman Setiawangsa,54200 Kuala Lumpur,Wilayah Persekutuan Kuala Lumpur Tel: 03-4259 6000Email: [email protected]: https://www.pernec.com.my/', 'scope': 'The Target of Evaluation (TOE) is CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 (TOE Server) and CYSECA Endpoint Application Control Client v1.1.12 (TOE Client). The TOE is an endpoint application control allows organization to enhance the defences against executing unwanted or malicious application on critical endpoint computer. TOE comprise of server and client components that can be operated in one or more instance. TOE is designed with granular policy, extensive application catalogue as well as, real-time monitoring and defences, CYSECA reduces the risk of threat exposures on client. The TOE is designed for Application control implementation for client and allows only selected files or applications that are allowed/whitelisted to be executed while others are being stopped.', 'certification_date': '2020-10-23', 'expiration_date': '2025-10-23'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '29b5f5e18f2f0ae3f80023268728f985fbf3764f0b285dd0bac69218f7b9c607', 'txt_hash': '48112fed830cfe90e62f228a2196843c6ebfd5edacf69de1c743bced364e81b5'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '65784209012db66aca01b911ebf4af00d38de9da34e32cd215e632cb8a1d382e', 'txt_hash': '4f3077f8f1b807d8d2b5ed1960d793c5f713f0510aa54d373a12c12007757e15'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6242ac7808d36e9f7f997ccf7948471070aa4128bf478d7d987a62dc29b1775b', 'txt_hash': 'e8c971253352cf70ae9662dd40bd0595db4dcdad7cefe2a18772125bed24dee4'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 789695, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Producer': 'macOS Version 10.15.7 (Build 19H2) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20201111142929Z00'00'", '/ModDate': "D:20201111142929Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 731500, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 41, '/Title': 'CYSECA Security Target', '/Author': 'Securelytics', '/Subject': 'SECURITY TARGET', '/Creator': 'Microsoft Word', '/CreationDate': "D:20200929083327+00'00'", '/ModDate': "D:20200929083327+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://awl.cyseca.com/manual/views/super-admin/super-register.html', 'http://www.commonriteriaportal.org/', 'https://awl.cyseca.com/manual/views/read-only/read-login.html', 'https://awl.cyseca.com/manual/views/client/client-install.html']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 226462, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20201105094524+08'00'", '/Creator': 'ISCB Printer', '/ModDate': "D:20201105125157+08'00'", '/Producer': 'KONICA MINOLTA bizhub C360i', '/Title': 'SISCB Print20110509451', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-5-RPT-C112-CR-v1': 36, 'ISCB-3-RPT-C112-CR-v1': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PLATFORM': 1, 'A.ADMIN': 1, 'A.USER': 1, 'A.TIMESTAMP': 1, 'A.PHYSICAL': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 7}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMS.2': 1, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_FUN.1': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 4, 'ASE_SPD.1': 4, 'ASE_OBJ.2': 4, 'ASE_ECD.1': 4, 'ASE_REQ.2': 7, 'ASE_TSS.1': 4}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_SAR.1': 4, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FDP': {'FDP_IFF': 2, 'FDP_ACC.1': 13, 'FDP_ACF.1': 8, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_ATD.1': 5, 'FIA_UAU.2': 5, 'FIA_UID.2': 6, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 4, 'FIA_UID.2.1': 1, 'FIA_ATD': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.3': 8, 'FMT_MTD.1': 6, 'FMT_SMF.1': 9, 'FMT_SMR.1': 13, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 2}, 'FTP': {'FTP_TRP.1': 5, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.CONFIG': 4, 'O.USER': 5, 'O.SEC_COM': 1, 'O.ACCESS': 2, 'O.MANAGE': 1}, 'T': {'T.CONFIG': 4, 'T.MASQUERADE': 3, 'T.UNAUTHORISED_AC': 1, 'T.AUDIT_COMPROMISE': 2}, 'A': {'A.PLATFORM': 4, 'A.ADMIN': 2, 'A.USER': 4, 'A.TIMESTAMP': 3, 'A.PHYSICAL': 4}, 'OE': {'OE.USER': 3, 'OE.TOE_ACCESS': 3, 'OE.PLATFORM': 2, 'OE.ADMIN': 1, 'OE.TIMESTAMP': 1, 'OE.PHYSICAL': 1}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 2, 'TLS v1.2': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of Scope': 1, ' The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation': 1, 'within the TOE boundary). The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation. In order to comply with the evaluated configuration, the following hardware and': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C112-CR-v1.pdf
. - The st_filename property was set to
CYSECA Security Target v1.0.pdf
. - The cert_filename property was set to
ISCB-5-CERT-C112-CERTIFICATE-v1 signed.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-5-RPT-C112-CR-v1
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C112-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CYSECA%20Security%20Target%20v1.0.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
- The cert property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C112-CERTIFICATE-v1%20signed.pdf",
"dgst": "5bbd05b848eb7573",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C112-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.1.12",
"1.2.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2020-007-C112",
"certification_date": "2020-10-23",
"developer": "Pernec Integrated Network Systems Sdn Bhd",
"enhanced": {
"assurance_level": "EAL2",
"category": "Other Devices and Systems",
"cert_id": "C112",
"certification_date": "2020-10-23",
"developer": "21, Jalan Setiawangsa 8,Taman Setiawangsa,54200 Kuala Lumpur,Wilayah Persekutuan Kuala Lumpur Tel: 03-4259 6000Email: [email protected]: https://www.pernec.com.my/",
"expiration_date": "2025-10-23",
"mutual_recognition": "CCRA",
"product": "CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/ISCB-5-RPT-C112-CR-v1.pdf",
"scope": "The Target of Evaluation (TOE) is CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 (TOE Server) and CYSECA Endpoint Application Control Client v1.1.12 (TOE Client). The TOE is an endpoint application control allows organization to enhance the defences against executing unwanted or malicious application on critical endpoint computer. TOE comprise of server and client components that can be operated in one or more instance. TOE is designed with granular policy, extensive application catalogue as well as, real-time monitoring and defences, CYSECA reduces the risk of threat exposures on client. The TOE is designed for Application control implementation for client and allows only selected files or applications that are allowed/whitelisted to be executed while others are being stopped.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/CYSECA_Security_Target_v1.0.pdf",
"type": "Other Devices and Systems"
},
"expiration_date": "2025-10-23",
"level": "EAL2",
"product": "CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/133"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Pernec Integrated Network Systems Sdn. Bhd.",
"manufacturer_web": "https://www.pernec.com.my/",
"name": "CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12",
"not_valid_after": "2025-10-23",
"not_valid_before": "2020-10-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C112-CERTIFICATE-v1 signed.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20201105094524+08\u002700\u0027",
"/Creator": "ISCB Printer",
"/ModDate": "D:20201105125157+08\u002700\u0027",
"/Producer": "KONICA MINOLTA bizhub C360i",
"/Title": "SISCB Print20110509451",
"pdf_file_size_bytes": 226462,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-5-RPT-C112-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-3-RPT-C112-CR-v1": 1,
"ISCB-5-RPT-C112-CR-v1": 36
}
},
"cc_claims": {
"A": {
"A.ADMIN": 1,
"A.PHYSICAL": 1,
"A.PLATFORM": 1,
"A.TIMESTAMP": 1,
"A.USER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20201111142929Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20201111142929Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H2) Quartz PDFContext",
"pdf_file_size_bytes": 789695,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "CYSECA Security Target v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 2,
"A.PHYSICAL": 4,
"A.PLATFORM": 4,
"A.TIMESTAMP": 3,
"A.USER": 4
},
"O": {
"O.ACCESS": 2,
"O.CONFIG": 4,
"O.MANAGE": 1,
"O.SEC_COM": 1,
"O.USER": 5
},
"OE": {
"OE.ADMIN": 1,
"OE.PHYSICAL": 1,
"OE.PLATFORM": 2,
"OE.TIMESTAMP": 1,
"OE.TOE_ACCESS": 3,
"OE.USER": 3
},
"T": {
"T.AUDIT_COMPROMISE": 2,
"T.CONFIG": 4,
"T.MASQUERADE": 3,
"T.UNAUTHORISED_AC": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 4,
"ASE_ECD.1": 4,
"ASE_INT.1": 4,
"ASE_OBJ.2": 4,
"ASE_REQ.2": 7,
"ASE_SPD.1": 4,
"ASE_TSS.1": 4
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 7
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 4,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FDP": {
"FDP_ACC.1": 13,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2,
"FDP_IFF": 2
},
"FIA": {
"FIA_ATD": 1,
"FIA_ATD.1": 5,
"FIA_UAU.1": 1,
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 4,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 6,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 2
},
"FTP": {
"FTP_TRP.1": 5,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
" The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation": 1,
"out of Scope": 1,
"within the TOE boundary). The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation. In order to comply with the evaluated configuration, the following hardware and": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 2,
"TLS v1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STM": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Securelytics",
"/CreationDate": "D:20200929083327+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20200929083327+00\u002700\u0027",
"/Subject": "SECURITY TARGET",
"/Title": "CYSECA Security Target",
"pdf_file_size_bytes": 731500,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://awl.cyseca.com/manual/views/read-only/read-login.html",
"https://awl.cyseca.com/manual/views/client/client-install.html",
"https://awl.cyseca.com/manual/views/super-admin/super-register.html",
"http://www.commonriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 41
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C112-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CYSECA%20Security%20Target%20v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6242ac7808d36e9f7f997ccf7948471070aa4128bf478d7d987a62dc29b1775b",
"txt_hash": "e8c971253352cf70ae9662dd40bd0595db4dcdad7cefe2a18772125bed24dee4"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "29b5f5e18f2f0ae3f80023268728f985fbf3764f0b285dd0bac69218f7b9c607",
"txt_hash": "48112fed830cfe90e62f228a2196843c6ebfd5edacf69de1c743bced364e81b5"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "65784209012db66aca01b911ebf4af00d38de9da34e32cd215e632cb8a1d382e",
"txt_hash": "4f3077f8f1b807d8d2b5ed1960d793c5f713f0510aa54d373a12c12007757e15"
}
},
"status": "active"
}