CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12

CSV information ?

Status active
Valid from 23.10.2020
Valid until 23.10.2025
Scheme 🇲🇾 MY
Manufacturer Pernec Integrated Network Systems Sdn. Bhd.
Category Other Devices and Systems
Security level EAL2

Heuristics summary ?

Certificate ID: ISCB-5-RPT-C112-CR-v1

Certificate ?

Extracted keywords

Security level
EAL2

File metadata

Title SISCB Print20110509451
Creation date D:20201105094524+08'00'
Modification date D:20201105125157+08'00'
Pages 1
Creator ISCB Printer
Producer KONICA MINOLTA bizhub C360i

Certification report ?

Extracted keywords

Hash functions
MD5
Protocols
SSL, TLS

Security level
EAL2, EAL 2
Claims
A.PLATFORM, A.ADMIN, A.USER, A.TIMESTAMP, A.PHYSICAL
Certificates
ISCB-5-RPT-C112-CR-v1, ISCB-3-RPT-C112-CR-v1

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Creation date D:20201111142929Z00'00'
Modification date D:20201111142929Z00'00'
Pages 38
Creator Word
Producer macOS Version 10.15.7 (Build 19H2) Quartz PDFContext

Security target ?

Extracted keywords

Hash functions
MD5
Protocols
TLS, TLS v1.2

Vendor
STM

Security level
EAL2
Claims
O.CONFIG, O.USER, O.SEC_COM, O.ACCESS, O.MANAGE, T.CONFIG, T.MASQUERADE, T.UNAUTHORISED_AC, T.AUDIT_COMPROMISE, A.PLATFORM, A.ADMIN, A.USER, A.TIMESTAMP, A.PHYSICAL, OE.USER, OE.TOE_ACCESS, OE.PLATFORM, OE.ADMIN, OE.TIMESTAMP, OE.PHYSICAL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FDP_IFF, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FIA_ATD, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Certification process
out of Scope, The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation, within the TOE boundary). The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation. In order to comply with the evaluated configuration, the following hardware and

File metadata

Title CYSECA Security Target
Subject SECURITY TARGET
Author Securelytics
Creation date D:20200929083327+00'00'
Modification date D:20200929083327+00'00'
Pages 41
Creator Microsoft Word

Heuristics ?

Certificate ID: ISCB-5-RPT-C112-CR-v1

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2

Scheme data ?

Cert No 2020-007-C112
Developer Pernec Integrated Network Systems Sdn Bhd
Level EAL2
Product CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
Certification Date 23.10.2020
Expiration Date 23.10.2025
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/133
Enhanced
Cert Id C112
Product CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
Developer 21, Jalan Setiawangsa 8,Taman Setiawangsa,54200 Kuala Lumpur,Wilayah Persekutuan Kuala Lumpur Tel: 03-4259 6000Email: [email protected]: https://www.pernec.com.my/
Category Other Devices and Systems
Type Other Devices and Systems
Scope The Target of Evaluation (TOE) is CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 (TOE Server) and CYSECA Endpoint Application Control Client v1.1.12 (TOE Client). The TOE is an endpoint application control allows organization to enhance the defences against executing unwanted or malicious application on critical endpoint computer. TOE comprise of server and client components that can be operated in one or more instance. TOE is designed with granular policy, extensive application catalogue as well as, real-time monitoring and defences, CYSECA reduces the risk of threat exposures on client. The TOE is designed for Application control implementation for client and allows only selected files or applications that are allowed/whitelisted to be executed while others are being stopped.
Assurance Level EAL2
Certification Date 23.10.2020
Expiration Date 23.10.2025
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/CYSECA_Security_Target_v1.0.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/ISCB-5-RPT-C112-CR-v1.pdf
Status Valid

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2020-10-23', 'expiration_date': '2025-10-23', 'enhanced': {'__update__': {'developer': '21, Jalan Setiawangsa 8,Taman Setiawangsa,54200 Kuala Lumpur,Wilayah Persekutuan Kuala Lumpur Tel: 03-4259 6000Email: [email protected]: https://www.pernec.com.my/', 'scope': 'The Target of Evaluation (TOE) is CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 (TOE Server) and CYSECA Endpoint Application Control Client v1.1.12 (TOE Client). The TOE is an endpoint application control allows organization to enhance the defences against executing unwanted or malicious application on critical endpoint computer. TOE comprise of server and client components that can be operated in one or more instance. TOE is designed with granular policy, extensive application catalogue as well as, real-time monitoring and defences, CYSECA reduces the risk of threat exposures on client. The TOE is designed for Application control implementation for client and allows only selected files or applications that are allowed/whitelisted to be executed while others are being stopped.', 'certification_date': '2020-10-23', 'expiration_date': '2025-10-23'}}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '29b5f5e18f2f0ae3f80023268728f985fbf3764f0b285dd0bac69218f7b9c607', 'txt_hash': '48112fed830cfe90e62f228a2196843c6ebfd5edacf69de1c743bced364e81b5'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '65784209012db66aca01b911ebf4af00d38de9da34e32cd215e632cb8a1d382e', 'txt_hash': '4f3077f8f1b807d8d2b5ed1960d793c5f713f0510aa54d373a12c12007757e15'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6242ac7808d36e9f7f997ccf7948471070aa4128bf478d7d987a62dc29b1775b', 'txt_hash': 'e8c971253352cf70ae9662dd40bd0595db4dcdad7cefe2a18772125bed24dee4'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 789695, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Producer': 'macOS Version 10.15.7 (Build 19H2) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20201111142929Z00'00'", '/ModDate': "D:20201111142929Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 731500, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 41, '/Title': 'CYSECA Security Target', '/Author': 'Securelytics', '/Subject': 'SECURITY TARGET', '/Creator': 'Microsoft Word', '/CreationDate': "D:20200929083327+00'00'", '/ModDate': "D:20200929083327+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://awl.cyseca.com/manual/views/super-admin/super-register.html', 'http://www.commonriteriaportal.org/', 'https://awl.cyseca.com/manual/views/read-only/read-login.html', 'https://awl.cyseca.com/manual/views/client/client-install.html']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 226462, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20201105094524+08'00'", '/Creator': 'ISCB Printer', '/ModDate': "D:20201105125157+08'00'", '/Producer': 'KONICA MINOLTA bizhub C360i', '/Title': 'SISCB Print20110509451', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C112-CR-v1': 36, 'ISCB-3-RPT-C112-CR-v1': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PLATFORM': 1, 'A.ADMIN': 1, 'A.USER': 1, 'A.TIMESTAMP': 1, 'A.PHYSICAL': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 7}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMS.2': 1, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_FUN.1': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 4, 'ASE_SPD.1': 4, 'ASE_OBJ.2': 4, 'ASE_ECD.1': 4, 'ASE_REQ.2': 7, 'ASE_TSS.1': 4}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_SAR.1': 4, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FDP': {'FDP_IFF': 2, 'FDP_ACC.1': 13, 'FDP_ACF.1': 8, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_ATD.1': 5, 'FIA_UAU.2': 5, 'FIA_UID.2': 6, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 4, 'FIA_UID.2.1': 1, 'FIA_ATD': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.3': 8, 'FMT_MTD.1': 6, 'FMT_SMF.1': 9, 'FMT_SMR.1': 13, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 2}, 'FTP': {'FTP_TRP.1': 5, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.CONFIG': 4, 'O.USER': 5, 'O.SEC_COM': 1, 'O.ACCESS': 2, 'O.MANAGE': 1}, 'T': {'T.CONFIG': 4, 'T.MASQUERADE': 3, 'T.UNAUTHORISED_AC': 1, 'T.AUDIT_COMPROMISE': 2}, 'A': {'A.PLATFORM': 4, 'A.ADMIN': 2, 'A.USER': 4, 'A.TIMESTAMP': 3, 'A.PHYSICAL': 4}, 'OE': {'OE.USER': 3, 'OE.TOE_ACCESS': 3, 'OE.PLATFORM': 2, 'OE.ADMIN': 1, 'OE.TIMESTAMP': 1, 'OE.PHYSICAL': 1}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 2, 'TLS v1.2': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of Scope': 1, ' The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation': 1, 'within the TOE boundary). The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation. In order to comply with the evaluated configuration, the following hardware and': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ISCB-5-RPT-C112-CR-v1.pdf.
    • The st_filename property was set to CYSECA Security Target v1.0.pdf.
    • The cert_filename property was set to ISCB-5-CERT-C112-CERTIFICATE-v1 signed.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-5-RPT-C112-CR-v1.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C112-CR-v1.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CYSECA%20Security%20Target%20v1.0.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C112-CERTIFICATE-v1%20signed.pdf",
  "dgst": "5bbd05b848eb7573",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C112-CR-v1",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.1.12",
        "1.2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2020-007-C112",
      "certification_date": "2020-10-23",
      "developer": "Pernec Integrated Network Systems Sdn Bhd",
      "enhanced": {
        "assurance_level": "EAL2",
        "category": "Other Devices and Systems",
        "cert_id": "C112",
        "certification_date": "2020-10-23",
        "developer": "21, Jalan Setiawangsa 8,Taman Setiawangsa,54200 Kuala Lumpur,Wilayah Persekutuan Kuala Lumpur Tel: 03-4259 6000Email: [email protected]: https://www.pernec.com.my/",
        "expiration_date": "2025-10-23",
        "mutual_recognition": "CCRA",
        "product": "CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/ISCB-5-RPT-C112-CR-v1.pdf",
        "scope": "The Target of Evaluation (TOE) is CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 (TOE Server) and CYSECA Endpoint Application Control Client v1.1.12 (TOE Client). The TOE is an endpoint application control allows organization to enhance the defences against executing unwanted or malicious application on critical endpoint computer. TOE comprise of server and client components that can be operated in one or more instance. TOE is designed with granular policy, extensive application catalogue as well as, real-time monitoring and defences, CYSECA reduces the risk of threat exposures on client. The TOE is designed for Application control implementation for client and allows only selected files or applications that are allowed/whitelisted to be executed while others are being stopped.",
        "status": "Valid",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/CYSECA_Security_Target_v1.0.pdf",
        "type": "Other Devices and Systems"
      },
      "expiration_date": "2025-10-23",
      "level": "EAL2",
      "product": "CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/133"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Pernec Integrated Network Systems Sdn. Bhd.",
  "manufacturer_web": "https://www.pernec.com.my/",
  "name": "CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12",
  "not_valid_after": "2025-10-23",
  "not_valid_before": "2020-10-23",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ISCB-5-CERT-C112-CERTIFICATE-v1 signed.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20201105094524+08\u002700\u0027",
      "/Creator": "ISCB Printer",
      "/ModDate": "D:20201105125157+08\u002700\u0027",
      "/Producer": "KONICA MINOLTA bizhub C360i",
      "/Title": "SISCB Print20110509451",
      "pdf_file_size_bytes": 226462,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "ISCB-5-RPT-C112-CR-v1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-3-RPT-C112-CR-v1": 1,
          "ISCB-5-RPT-C112-CR-v1": 36
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 1,
          "A.PHYSICAL": 1,
          "A.PLATFORM": 1,
          "A.TIMESTAMP": 1,
          "A.USER": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3,
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20201111142929Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20201111142929Z00\u002700\u0027",
      "/Producer": "macOS Version 10.15.7 (Build 19H2) Quartz PDFContext",
      "pdf_file_size_bytes": 789695,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    },
    "st_filename": "CYSECA Security Target v1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.PHYSICAL": 4,
          "A.PLATFORM": 4,
          "A.TIMESTAMP": 3,
          "A.USER": 4
        },
        "O": {
          "O.ACCESS": 2,
          "O.CONFIG": 4,
          "O.MANAGE": 1,
          "O.SEC_COM": 1,
          "O.USER": 5
        },
        "OE": {
          "OE.ADMIN": 1,
          "OE.PHYSICAL": 1,
          "OE.PLATFORM": 2,
          "OE.TIMESTAMP": 1,
          "OE.TOE_ACCESS": 3,
          "OE.USER": 3
        },
        "T": {
          "T.AUDIT_COMPROMISE": 2,
          "T.CONFIG": 4,
          "T.MASQUERADE": 3,
          "T.UNAUTHORISED_AC": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 4,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 4,
          "ASE_OBJ.2": 4,
          "ASE_REQ.2": 7,
          "ASE_SPD.1": 4,
          "ASE_TSS.1": 4
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 7
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 4,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 13,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 2,
          "FDP_IFF": 2
        },
        "FIA": {
          "FIA_ATD": 1,
          "FIA_ATD.1": 5,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 5,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 4,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 8,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 8,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 1,
          "FMT_MTD.1": 6,
          "FMT_SMF.1": 9,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 2
        },
        "FTP": {
          "FTP_TRP.1": 5,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation": 1,
          "out of Scope": 1,
          "within the TOE boundary). The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation. In order to comply with the evaluated configuration, the following hardware and": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 2,
            "TLS v1.2": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STM": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Securelytics",
      "/CreationDate": "D:20200929083327+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/ModDate": "D:20200929083327+00\u002700\u0027",
      "/Subject": "SECURITY TARGET",
      "/Title": "CYSECA Security Target",
      "pdf_file_size_bytes": 731500,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://awl.cyseca.com/manual/views/read-only/read-login.html",
          "https://awl.cyseca.com/manual/views/client/client-install.html",
          "https://awl.cyseca.com/manual/views/super-admin/super-register.html",
          "http://www.commonriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 41
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C112-CR-v1.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CYSECA%20Security%20Target%20v1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6242ac7808d36e9f7f997ccf7948471070aa4128bf478d7d987a62dc29b1775b",
      "txt_hash": "e8c971253352cf70ae9662dd40bd0595db4dcdad7cefe2a18772125bed24dee4"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "29b5f5e18f2f0ae3f80023268728f985fbf3764f0b285dd0bac69218f7b9c607",
      "txt_hash": "48112fed830cfe90e62f228a2196843c6ebfd5edacf69de1c743bced364e81b5"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "65784209012db66aca01b911ebf4af00d38de9da34e32cd215e632cb8a1d382e",
      "txt_hash": "4f3077f8f1b807d8d2b5ed1960d793c5f713f0510aa54d373a12c12007757e15"
    }
  },
  "status": "active"
}