Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02
CSV information ?
Status | archived |
---|---|
Valid from | 13.02.2017 |
Valid until | 13.02.2022 |
Scheme | 🇯🇵 JP |
Manufacturer | Hitachi, Ltd. |
Category | Access Control Devices and Systems |
Security level | ALC_FLR.1, EAL2+ |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL2Security Assurance Requirements (SAR)
ALC_FLR.1File metadata
Creation date | D:20170911161211+09'00' |
---|---|
Modification date | D:20170911161350+09'00' |
Pages | 1 |
Creator | Word 用 Acrobat PDFMaker 11 |
Producer | Adobe PDF Library 11.0 |
Certification report ?
Extracted keywords
Protocols
SSHTrusted Execution Environments
SEVendor
MicrosoftSecurity level
EAL2, EAL2 augmentedClaims
T.ILLEGAL_ACCESS, T.UNAUTHORISED_ACCESS, A.PHYSICAL, A.NETWORKS, A.ADMINISTRATORS, A.SECURE_CHANNEL, A.PASSWORD, A.CLIENTS, A.SRV_MGMTSecurity Assurance Requirements (SAR)
ALC_FLR.1Certificates
CRP-C0536-01, Certification No. C0536Standards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date | D:20171211090255+09'00' |
---|---|
Modification date | D:20171211090339+09'00' |
Pages | 34 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Security target ?
Extracted keywords
Trusted Execution Environments
SEVendor
Microsoft Corporation, MicrosoftSecurity level
EAL2, EAL2 augmentedClaims
O.MGMT, O.BANNER, O.PASSWORD, T.ILLEGAL_ACCESS, T.UNAUTHORISED_ACCESS, A.PHYSICAL, A.NETWORKS, A.ADMINISTRATORS, A.SECURE_CHANNEL, A.PASSWORD, A.CLIENTS, A.SRV_MGMTSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ACC, FDP_ACF, FIA_UID.1, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.1, FIA_SOS.1.1, FIA_ATD.1, FIA_ATD.1.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FIA_SOS, FIA_ATD, FIA_AFL, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR, FTA_TAB.1, FTA_TAB.1.1, FTA_TABStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
Creation date | D:20171130192201+09'00' |
---|---|
Modification date | D:20171130192201+09'00' |
Pages | 64 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Heuristics ?
Extracted SARs
ADV_TDS.1, ASE_CCL.1, ALC_CMC.2, ASE_TSS.1, ALC_DEL.1, ATE_COV.1, ASE_REQ.2, ADV_FSP.2, ADV_ARC.1, AGD_PRE.1, ATE_FUN.1, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, AGD_OPE.1, AVA_VAN.2, ALC_CMS.2, ASE_OBJ.2, ALC_FLR.1, ASE_INT.1Similar certificates
Name | Certificate ID | |
---|---|---|
HP XP7 Device Manager Software, HP XP7 Tiered Storage Manager Software 8.0.1-02 | JISEC-CC-CRP-C0567 | Compare |
Scheme data ?
Cert Id | C0536 | |
---|---|---|
Supplier | Hitachi, Ltd. | |
Toe Overseas Name | Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02 | |
Expiration Date | 2022-03 | |
Claim | EAL2+ALC_FLR.1 | |
Certification Date | 2017-02 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0536_it5576.html | |
Toe Japan Name | Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02 | |
Enhanced | ||
Product | Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software | |
Toe Version | 8.0.1-02 | |
Product Type | Access Control Device and Systems | |
Certification Date | 2017-02-13 | |
Cc Version | 3.1 Release4 | |
Assurance Level | EAL2 Augmented with ALC_FLR.1 | |
Vendor | Hitachi, Ltd. | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Information Security Evaluation Office | |
Report Link | https://www.ipa.go.jp/en/security/c0536_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0536_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0536_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE The TOE is Hitachi Device Manager software and Hitachi Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). TOE security functionality The TOE provides the following security functionality: - Identification/authentication functionality(The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) - Access control functionality for storage resource information and for warning banner information - Warning banner functionality |
References ?
No references are available for this certificate.
Updates ?
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0536', 'supplier': 'Hitachi, Ltd.', 'toe_overseas_name': 'Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02', 'expiration_date': '2022-03', 'claim': 'EAL2+ALC_FLR.1', 'certification_date': '2017-02', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0536_it5576.html', 'toe_japan_name': 'Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02', 'enhanced': {'product': 'Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software', 'toe_version': '8.0.1-02', 'product_type': 'Access Control Device and Systems', 'certification_date': '2017-02-13', 'cc_version': '3.1 Release4', 'assurance_level': 'EAL2 Augmented with ALC_FLR.1', 'vendor': 'Hitachi, Ltd.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc.\n Information Security Evaluation Office', 'report_link': 'https://www.ipa.go.jp/en/security/c0536_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0536_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0536_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n The TOE is Hitachi Device Manager software and Hitachi Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). \n \n TOE security functionality \n The TOE provides the following security functionality: \n \n \n \n - \n Identification/authentication functionality(The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) \n \n \n - \n Access control functionality for storage resource information and for warning banner information \n \n \n - \n Warning banner functionality'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ab487808991ba68ed0629cafa3db91589ed1e7e5cf88b3126fa76c5388c9ecc6', 'txt_hash': '70e5546dc52e34b121a2e0864d883c8e1eb658f335f5dfaf63a3159d5344d671'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a4a5577ad7917bea5031eae066b1c16123c94bfb5536aff70217b7632d742688', 'txt_hash': 'a38cda07efeda4ca2ccd2b716cfc98b5823b6543c4da4331ebcbeff209686ada'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b70f0725d54c80a4f6137a1013a9964a86c2453af14f19022056231748483205', 'txt_hash': '5ef6570b853e51679ea78837ff677cfd765fc1979333d6a36841bfa0fadd3ff5'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 207872, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 34, '/CreationDate': "D:20171211090255+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20171211090339+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1103262, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 64, '/Producer': 'Microsoft® Word 2016', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20171130192201+09'00'", '/ModDate': "D:20171130192201+09'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 453124, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 1, '/CreationDate': "D:20170911161211+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 11', '/ModDate': "D:20170911161350+09'00'", '/Producer': 'Adobe PDF Library 11.0', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0536-01': 1, 'Certification No. C0536': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 4}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.ILLEGAL_ACCESS': 1, 'T.UNAUTHORISED_ACCESS': 1}, 'A': {'A.PHYSICAL': 2, 'A.NETWORKS': 1, 'A.ADMINISTRATORS': 1, 'A.SECURE_CHANNEL': 1, 'A.PASSWORD': 1, 'A.CLIENTS': 1, 'A.SRV_MGMT': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 8, 'EAL2 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_ACC.1': 13, 'FDP_ACF.1': 10, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2, 'FDP_ACC': 1, 'FDP_ACF': 1}, 'FIA': {'FIA_UID.1': 9, 'FIA_UAU.1': 8, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.1': 7, 'FIA_SOS.1.1': 1, 'FIA_ATD.1': 7, 'FIA_ATD.1.1': 1, 'FIA_USB.1': 6, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU': 2, 'FIA_SOS': 1, 'FIA_ATD': 1, 'FIA_AFL': 1}, 'FMT': {'FMT_MSA.3': 8, 'FMT_MSA.1': 9, 'FMT_SMR.1': 12, 'FMT_SMF.1': 11, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 9, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 2, 'FMT_MTD': 1, 'FMT_SMF': 1, 'FMT_SMR': 1}, 'FTA': {'FTA_TAB.1': 7, 'FTA_TAB.1.1': 1, 'FTA_TAB': 1}}, 'cc_claims': {'O': {'O.MGMT': 9, 'O.BANNER': 6, 'O.PASSWORD': 7}, 'T': {'T.ILLEGAL_ACCESS': 4, 'T.UNAUTHORISED_ACCESS': 3}, 'A': {'A.PHYSICAL': 4, 'A.NETWORKS': 3, 'A.ADMINISTRATORS': 4, 'A.SECURE_CHANNEL': 3, 'A.PASSWORD': 4, 'A.CLIENTS': 3, 'A.SRV_MGMT': 4}}, 'vendor': {'Microsoft': {'Microsoft Corporation': 4, 'Microsoft': 3}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0536_erpt.pdf
. - The st_filename property was set to
c0536_est.pdf
. - The cert_filename property was set to
c0536_eimg.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0536
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_est.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Access Control Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_eimg.pdf",
"dgst": "bd28ac0feda9039e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0536",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"8.0.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "C0536",
"certification_date": "2017-02",
"claim": "EAL2+ALC_FLR.1",
"enhanced": {
"assurance_level": "EAL2 Augmented with ALC_FLR.1",
"cc_version": "3.1 Release4",
"cert_link": "https://www.ipa.go.jp/en/security/c0536_eimg.pdf",
"certification_date": "2017-02-13",
"description": "PRODUCT DESCRIPTION \n Description of TOE \n The TOE is Hitachi Device Manager software and Hitachi Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). \n \n TOE security functionality \n The TOE provides the following security functionality: \n \n \n \n - \n Identification/authentication functionality(The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) \n \n \n - \n Access control functionality for storage resource information and for warning banner information \n \n \n - \n Warning banner functionality",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc.\n Information Security Evaluation Office",
"product": "Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software",
"product_type": "Access Control Device and Systems",
"report_link": "https://www.ipa.go.jp/en/security/c0536_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0536_est.pdf",
"toe_version": "8.0.1-02",
"vendor": "Hitachi, Ltd."
},
"expiration_date": "2022-03",
"supplier": "Hitachi, Ltd.",
"toe_japan_name": "Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0536_it5576.html",
"toe_overseas_name": "Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hitachi, Ltd.",
"manufacturer_web": "https://www.hitachi.com/",
"name": "Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02",
"not_valid_after": "2022-02-13",
"not_valid_before": "2017-02-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "c0536_eimg.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20170911161211+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 11",
"/ModDate": "D:20170911161350+09\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/Title": "",
"pdf_file_size_bytes": 453124,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 1
},
"report_filename": "c0536_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0536-01": 1,
"Certification No. C0536": 1
}
},
"cc_claims": {
"A": {
"A.ADMINISTRATORS": 1,
"A.CLIENTS": 1,
"A.NETWORKS": 1,
"A.PASSWORD": 1,
"A.PHYSICAL": 2,
"A.SECURE_CHANNEL": 1,
"A.SRV_MGMT": 1
},
"T": {
"T.ILLEGAL_ACCESS": 1,
"T.UNAUTHORISED_ACCESS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 4
}
},
"cc_security_level": {
"EAL": {
"EAL2": 4,
"EAL2 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 3
}
},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20171211090255+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20171211090339+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 207872,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 34
},
"st_filename": "c0536_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMINISTRATORS": 4,
"A.CLIENTS": 3,
"A.NETWORKS": 3,
"A.PASSWORD": 4,
"A.PHYSICAL": 4,
"A.SECURE_CHANNEL": 3,
"A.SRV_MGMT": 4
},
"O": {
"O.BANNER": 6,
"O.MGMT": 9,
"O.PASSWORD": 7
},
"T": {
"T.ILLEGAL_ACCESS": 4,
"T.UNAUTHORISED_ACCESS": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.1": 7
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 8,
"EAL2 augmented": 3
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 13,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 10,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 8,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 9,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 6,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 2,
"FMT_MSA.1": 9,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 9,
"FMT_MTD.1.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FTA": {
"FTA_TAB": 1,
"FTA_TAB.1": 7,
"FTA_TAB.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 3,
"Microsoft Corporation": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20171130192201+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20171130192201+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 1103262,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 64
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b70f0725d54c80a4f6137a1013a9964a86c2453af14f19022056231748483205",
"txt_hash": "5ef6570b853e51679ea78837ff677cfd765fc1979333d6a36841bfa0fadd3ff5"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ab487808991ba68ed0629cafa3db91589ed1e7e5cf88b3126fa76c5388c9ecc6",
"txt_hash": "70e5546dc52e34b121a2e0864d883c8e1eb658f335f5dfaf63a3159d5344d671"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a4a5577ad7917bea5031eae066b1c16123c94bfb5536aff70217b7632d742688",
"txt_hash": "a38cda07efeda4ca2ccd2b716cfc98b5823b6543c4da4331ebcbeff209686ada"
}
},
"status": "archived"
}