Huawei GaussDB 200 version 6.5.1 build e3690037
CSV information ?
Status | active |
---|---|
Valid from | 22.03.2022 |
Valid until | 22.03.2027 |
Scheme | 🇪🇸 ES |
Manufacturer | Huawei Technologies Co., Ltd. |
Category | Databases |
Security level | ALC_FLR.2, EAL2+ |
Protection profiles |
Heuristics summary ?
Certificate ?
Extracted keywords
Vendor
Huawei, Huawei Technologies CoSecurity level
EAL 4, EAL 2, EAL2Claims
O.E, A.U, R.CSecurity Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2Protection profiles
BSI-CC-PP-0088-V2File metadata
Creation date | D:20220310164952+01'00' |
---|---|
Modification date | D:20220310164952+01'00' |
Pages | 2 |
Producer | GPL Ghostscript 9.27 |
Certification report ?
Extracted keywords
Hash functions
SHA256Protocols
TLS, TLSv1.1, TLSv1.2Vendor
Huawei, Huawei Technologies CoSecurity level
EAL2, EAL2+, EAL 1, EAL 4, EAL 2, ITSEC EvaluationClaims
A.USecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_CMC.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FPT_TRC.1, FTA_MCS.1, FTA_TSE.1Protection profiles
BSI-CC-PP-0088-V2Certificates
2019-32-INF-3664- v1Evaluation facilities
DEKRA Testing and CertificationFile metadata
Creation date | D:20220325091528+01'00' |
---|---|
Modification date | D:20220325091528+01'00' |
Pages | 14 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Security target ?
Extracted keywords
Hash functions
SHA256Vendor
Huawei Technologies Co, HuaweiSecurity level
EAL 2Claims
O.ADMIN_ROLE, O.AUDIT, O.DISCRETIONARY, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORM, O.TOE_ACCESS, O.AUDIT_GENERATION, O.DISCRETIONARY_ACCESS, O.RESIDUAL_INFORMATION, O.RESIDUAL, O.TOE_ACCE, O.ADMIN_RO, O.DISCRETIO, O.RESIDUAL_, O.AUDIT_GE, O.ADMIN_ROL, O.RESIDUAL_I, O.TOE_ACCES, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, T.ACCESS_TSF, T.IA_MASQUE, T.RESIDUAL_, T.TSF_COMPR, T.UNAUTHOR, T.TSF, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, A.NO_GENERA, A.PEER_FUNC, A.TRAINEDUS, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED, OE.IT_TRUSTED_SYSTEM, OE.NO_GENE, OE.NO_GENERAL, OE.INFO, OE.IT_REMOT, OE.IT_TRUST, OE.INFO_PROSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FAU_MTD.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_USB.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_STM.1, FPT_ITT.1, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1Protection profiles
BSI-CC-PP-0088-V2Certification process
out of scope, including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE, this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE, with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are, provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a, Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the, Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz, 1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools, is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used toHeuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ALC_FLR.2, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2020-1790 | HIGH | 8.8 | 5.9 | 18.02.2020 03:15 | ||
CVE-2020-1811 | HIGH | 8.8 | 5.9 | 18.02.2020 00:15 | ||
CVE-2020-1853 | MEDIUM | 6.5 | 3.6 | 17.02.2020 21:15 |
Similar certificates
Name | Certificate ID | |
---|---|---|
Secure Objects incorporating Secure Envelopes, Version: 1.5.1, Auth Server Component: Build 1.5.1.6 All Other Components: Build 1.5.1.5 | Certificate Number: 2011/73 | Compare |
Scheme data ?
Product | Huawei GaussDB 200 version 6.5.1 build e3690037 | |
---|---|---|
Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037 | |
Category | Database management systems | |
Manufacturer | Huawei Technologies Co., Ltd. | |
Certification Date | 22.03.2022 | |
Enhanced | ||
Description | The TOE is the Huawei GaussDB 200 Database Management System (DBMS). Huawei GaussDB 200 is an enterprise-level relational database for massively parallel processing (MPP), which adopts the MPP architecture, supports row and column storage, provides the capabilities of processing petabytes of data, and is oriented to massive data online analysis. | |
Category | Database management systems | |
Manufacturer | Huawei Technologies Co., Ltd. | |
Type | Product | |
Evaluation Facility | DEKRA Testing and Certification S.A.U. | |
Status | Certified | |
Certification Date | 22.03.2022 | |
Cc Version | Common Criteria 3.1 release 5 | |
Level | EAL2 + (ALC_FLR.2) | |
Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1425 | |
Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1426 | |
Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1427 |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2022-03-22'}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PP']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'pdf_hash': 'd02f59b7a6d5456731c35ebc9bb381df2e56cc8e578e4f38d8c6bcc1425d1f17', 'txt_hash': '3c923458c53ff9aae9cc3c56cadb125a1b0b82e243db896cbf01f90971014771'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c54b4d2999a8fabd845475365be7eae515610ba9bb9ab08ca411ea597f7f6182', 'txt_hash': 'de509c605a6b9c3912b02d919cc8fc13533d96955a3d461999e693952b5df28c'}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
{'pdf_file_size_bytes': 847729, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Producer': 'GPL Ghostscript 9.27', '/CreationDate': "D:20220310164952+01'00'", '/ModDate': "D:20220310164952+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 3}}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 3, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 12, 'FAU_GEN.2': 10, 'FAU_SEL.1': 10, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 2, 'FAU_SEL.1.1': 2, 'FAU_MTD.1': 2}, 'FDP': {'FDP_ACC.1': 19, 'FDP_ACF.1': 17, 'FDP_RIP.1': 10, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 2, 'FDP_IFC.1': 1}, 'FIA': {'FIA_ATD.1': 16, 'FIA_UAU.1': 9, 'FIA_UID.1': 15, 'FIA_USB.1': 5, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2}, 'FMT': {'FMT_MOF.1': 10, 'FMT_MSA.1': 11, 'FMT_MSA.3': 11, 'FMT_MTD.1': 10, 'FMT_REV.1': 15, 'FMT_SMF.1': 14, 'FMT_SMR.1': 21, 'FMT_MOF.1.1': 2, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 1, 'FMT_REV.1.1': 5, 'FMT_REV.1.2': 3, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2}, 'FPT': {'FPT_TRC.1': 11, 'FPT_TRC.1.1': 2, 'FPT_TRC.1.2': 2, 'FPT_STM.1': 1, 'FPT_ITT.1': 1}, 'FTA': {'FTA_MCS.1': 9, 'FTA_TSE.1': 8, 'FTA_MCS.1.1': 2, 'FTA_MCS.1.2': 2, 'FTA_TSE.1.1': 2}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 7, 'O.AUDIT': 2, 'O.DISCRETIONARY': 1, 'O.MANAGE': 13, 'O.MEDIATE': 9, 'O.RESIDUAL_INFORM': 1, 'O.TOE_ACCESS': 10, 'O.AUDIT_GENERATION': 3, 'O.DISCRETIONARY_ACCESS': 5, 'O.RESIDUAL_INFORMATION': 6, 'O.RESIDUAL': 2, 'O.TOE_ACCE': 8, 'O.ADMIN_RO': 3, 'O.DISCRETIO': 3, 'O.RESIDUAL_': 1, 'O.AUDIT_GE': 2, 'O.ADMIN_ROL': 1, 'O.RESIDUAL_I': 1, 'O.TOE_ACCES': 1}, 'T': {'T.ACCESS_TSFDATA': 2, 'T.ACCESS_TSFFUNC': 1, 'T.IA_MASQUERADE': 2, 'T.IA_USER': 2, 'T.RESIDUAL_DATA': 2, 'T.TSF_COMPROMISE': 1, 'T.UNAUTHORIZED_ACCESS': 2, 'T.ACCESS_TSF': 2, 'T.IA_MASQUE': 2, 'T.RESIDUAL_': 1, 'T.TSF_COMPR': 1, 'T.UNAUTHOR': 2, 'T.TSF': 1}, 'A': {'A.PHYSICAL': 3, 'A.AUTHUSER': 2, 'A.MANAGE': 3, 'A.TRAINEDUSER': 1, 'A.NO_GENERAL_PURPOSE': 2, 'A.SUPPORT': 4, 'A.CONNECT': 3, 'A.NO_GENERA': 1, 'A.PEER_FUNC': 1, 'A.TRAINEDUS': 1}, 'OE': {'OE.ADMIN': 10, 'OE.INFO_PROTECT': 11, 'OE.NO_GENERAL_PURPOSE': 4, 'OE.PHYSICAL': 8, 'OE.IT_REMOTE': 6, 'OE.IT_TRUSTED': 1, 'OE.IT_TRUSTED_SYSTEM': 5, 'OE.NO_GENE': 3, 'OE.NO_GENERAL': 1, 'OE.INFO': 5, 'OE.IT_REMOT': 4, 'OE.IT_TRUST': 4, 'OE.INFO_PRO': 4}}, 'vendor': {'Huawei': {'Huawei Technologies Co': 87, 'Huawei': 9}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 7, 'including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE': 1, 'this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE': 1, 'with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are': 1, 'provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a': 1, 'Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the': 1, 'Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz': 1, '1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools': 1, 'is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 2, 'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.E': 1}, 'A': {'A.U': 1}, 'R': {'R.C': 1}}, 'vendor': {'Huawei': {'Huawei': 2, 'Huawei Technologies Co': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
2019-32-ST.pdf
. - The cert_filename property was set to
2019-32_Certificado.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Huawei GaussDB 200 version 6.5.1 build e3690037 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Databases",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32_Certificado.pdf",
"dgst": "b91f3f25e268a1e0",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "2019-32-INF-3664",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:huawei:gaussdb_200:6.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:gaussdb_200:6.5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:gaussdb_200:6.5.1:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.5.1"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2020-1790",
"CVE-2020-1853",
"CVE-2020-1811"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Database management systems",
"certification_date": "2022-03-22",
"enhanced": {
"category": "Database management systems",
"cc_version": "Common Criteria 3.1 release 5",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1426",
"certification_date": "2022-03-22",
"description": "The TOE is the Huawei GaussDB 200 Database Management System (DBMS). Huawei GaussDB 200 is an enterprise-level relational database for massively parallel processing (MPP), which adopts the MPP architecture, supports row and column storage, provides the capabilities of processing petabytes of data, and is oriented to massive data online analysis.",
"evaluation_facility": "DEKRA Testing and Certification S.A.U.",
"level": "EAL2 + (ALC_FLR.2)",
"manufacturer": "Huawei Technologies Co., Ltd.",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1427",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1425",
"type": "Product"
},
"manufacturer": "Huawei Technologies Co., Ltd.",
"product": "Huawei GaussDB 200 version 6.5.1 build e3690037",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Huawei Technologies Co., Ltd.",
"manufacturer_web": "https://www.huawei.com",
"name": "Huawei GaussDB 200 version 6.5.1 build e3690037",
"not_valid_after": "2027-03-22",
"not_valid_before": "2022-03-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "2019-32_Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.U": 1
},
"O": {
"O.E": 1
},
"R": {
"R.C": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0088-V2": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 2,
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 2,
"Huawei Technologies Co": 2
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20220310164952+01\u002700\u0027",
"/ModDate": "D:20220310164952+01\u002700\u0027",
"/Producer": "GPL Ghostscript 9.27",
"pdf_file_size_bytes": 847729,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "2019-32-INF-3664.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2019-32-INF-3664- v1": 1
}
},
"cc_claims": {
"A": {
"A.U": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0088-V2": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE": 3,
"AGD_OPE.1": 1,
"AGD_PRE": 4
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 2,
"ALC_FLR.2": 8
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 7,
"EAL2+": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_GEN.2": 1,
"FAU_SEL.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_RIP.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_UAU.1": 1,
"FIA_UID.1": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MSA.1": 1,
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_REV.1": 2,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_TRC.1": 1
},
"FTA": {
"FTA_MCS.1": 1,
"FTA_TSE.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 3,
"TLSv1.1": 1,
"TLSv1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DEKRA": {
"DEKRA Testing and Certification": 5
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 14,
"Huawei Technologies Co": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20220325091528+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20220325091528+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 909986,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.org/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "2019-32-ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUTHUSER": 2,
"A.CONNECT": 3,
"A.MANAGE": 3,
"A.NO_GENERA": 1,
"A.NO_GENERAL_PURPOSE": 2,
"A.PEER_FUNC": 1,
"A.PHYSICAL": 3,
"A.SUPPORT": 4,
"A.TRAINEDUS": 1,
"A.TRAINEDUSER": 1
},
"O": {
"O.ADMIN_RO": 3,
"O.ADMIN_ROL": 1,
"O.ADMIN_ROLE": 7,
"O.AUDIT": 2,
"O.AUDIT_GE": 2,
"O.AUDIT_GENERATION": 3,
"O.DISCRETIO": 3,
"O.DISCRETIONARY": 1,
"O.DISCRETIONARY_ACCESS": 5,
"O.MANAGE": 13,
"O.MEDIATE": 9,
"O.RESIDUAL": 2,
"O.RESIDUAL_": 1,
"O.RESIDUAL_I": 1,
"O.RESIDUAL_INFORM": 1,
"O.RESIDUAL_INFORMATION": 6,
"O.TOE_ACCE": 8,
"O.TOE_ACCES": 1,
"O.TOE_ACCESS": 10
},
"OE": {
"OE.ADMIN": 10,
"OE.INFO": 5,
"OE.INFO_PRO": 4,
"OE.INFO_PROTECT": 11,
"OE.IT_REMOT": 4,
"OE.IT_REMOTE": 6,
"OE.IT_TRUST": 4,
"OE.IT_TRUSTED": 1,
"OE.IT_TRUSTED_SYSTEM": 5,
"OE.NO_GENE": 3,
"OE.NO_GENERAL": 1,
"OE.NO_GENERAL_PURPOSE": 4,
"OE.PHYSICAL": 8
},
"T": {
"T.ACCESS_TSF": 2,
"T.ACCESS_TSFDATA": 2,
"T.ACCESS_TSFFUNC": 1,
"T.IA_MASQUE": 2,
"T.IA_MASQUERADE": 2,
"T.IA_USER": 2,
"T.RESIDUAL_": 1,
"T.RESIDUAL_DATA": 2,
"T.TSF": 1,
"T.TSF_COMPR": 1,
"T.TSF_COMPROMISE": 1,
"T.UNAUTHOR": 2,
"T.UNAUTHORIZED_ACCESS": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0088-V2": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 1,
"AGD_PRE": 3,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 12,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 10,
"FAU_GEN.2.1": 2,
"FAU_MTD.1": 2,
"FAU_SEL.1": 10,
"FAU_SEL.1.1": 2
},
"FDP": {
"FDP_ACC.1": 19,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 17,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 1,
"FDP_RIP.1": 10,
"FDP_RIP.1.1": 2
},
"FIA": {
"FIA_ATD.1": 16,
"FIA_ATD.1.1": 2,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UID.1": 15,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2,
"FIA_USB.1": 5
},
"FMT": {
"FMT_MOF.1": 10,
"FMT_MOF.1.1": 2,
"FMT_MSA.1": 11,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 1,
"FMT_REV.1": 15,
"FMT_REV.1.1": 5,
"FMT_REV.1.2": 3,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 21,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 2
},
"FPT": {
"FPT_ITT.1": 1,
"FPT_STM.1": 1,
"FPT_TRC.1": 11,
"FPT_TRC.1.1": 2,
"FPT_TRC.1.2": 2
},
"FTA": {
"FTA_MCS.1": 9,
"FTA_MCS.1.1": 2,
"FTA_MCS.1.2": 2,
"FTA_TSE.1": 8,
"FTA_TSE.1.1": 2
}
},
"certification_process": {
"OutOfScope": {
"1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools": 1,
"Co., Ltd. 6 Item Requirement \u25cf NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz": 1,
"Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the": 1,
"including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE": 1,
"is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to": 1,
"out of scope": 7,
"provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a": 1,
"this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE": 1,
"with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 9,
"Huawei Technologies Co": 87
}
},
"vulnerability": {}
},
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL2+",
"pp_ids": {
"_type": "Set",
"elements": [
"DBMS_PP"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0088b_pdf.pdf",
"pp_name": "Base Protection Profile for Database Management Systems"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c54b4d2999a8fabd845475365be7eae515610ba9bb9ab08ca411ea597f7f6182",
"txt_hash": "de509c605a6b9c3912b02d919cc8fc13533d96955a3d461999e693952b5df28c"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "751bc00acd3f7630e3c5c689e0831c7d3c4e555f1fab98256a3ec0cd688e2b18",
"txt_hash": "cb0a07fbf7792960f58c0c79306b0b859c18ed6a66fa5122b08eb69ca0d354b5"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "d02f59b7a6d5456731c35ebc9bb381df2e56cc8e578e4f38d8c6bcc1425d1f17",
"txt_hash": "3c923458c53ff9aae9cc3c56cadb125a1b0b82e243db896cbf01f90971014771"
}
},
"status": "active"
}