NC2.VPN+ v2.1.9
CSV information ?
Status | active |
---|---|
Valid from | 13.09.2021 |
Valid until | 13.09.2026 |
Scheme | 🇲🇾 MY |
Manufacturer | System Consultancy Services Sdn. Bhd. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL2File metadata
Creation date | D:20210917005316Z00'00' |
---|---|
Modification date | D:20210917005316Z00'00' |
Pages | 1 |
Creator | Word |
Producer | macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext |
Certification report ?
Extracted keywords
Symmetric Algorithms
AESProtocols
TLS v1.2, TLS v1.3, TLS, IPsec, VPNBlock cipher modes
CBC, CFB, OFBSecurity level
EAL2, EAL 2Claims
A.PHYSICAL, A.SINGLE_CONNECTION, A.TRUSTED_ADMINCertificates
ISCB-5-RPT-C121-CR-v1Standards
ISO/IEC15408, ISO/IEC 18045File metadata
Creation date | D:20210918094333Z00'00' |
---|---|
Modification date | D:20210918094333Z00'00' |
Pages | 34 |
Creator | Word |
Producer | macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext |
Security target ?
Extracted keywords
Symmetric Algorithms
AESProtocols
SSH, TLS v1.2, TLS v1.3, TLS, IPsec, VPNBlock cipher modes
CBC, CFB, OFB, GCMVendor
STM, MicrosoftSecurity level
EAL2Claims
O.DATA_FLOW_CONTROL, O.ENCRYPT, O.PROTECTED_MANAGEMENT, O.LOGGING, O.TOECOM, T.UNAUTHORIZED_DATA, T.READ_MODIFY_DATA, T.UNAUTHORIZED_ACCESS, T.UNDETECTED_ACTIONS, T.TOECOM, A.PHYSICAL, A.SINGLE_CONNECTION, A.TRUSTED_ADMIN, OE.PHYSICAL, OE.SINGLE_CONNECTION, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_ECD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN, FAU_GEN.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_IFF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_ATD.1.1, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_STM.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3File metadata
Title | SCS NC2.vpn+ Security Target |
---|---|
Subject | SCS Sdn Bhd |
Author | Securelytics |
Creation date | D:20210730035619+00'00' |
Modification date | D:20210730035619+00'00' |
Pages | 46 |
Creator | Microsoft Word |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Scheme data ?
Cert No | 2021-008-C121 | |
---|---|---|
Developer | System Consultancy Services Sdn. Bhd. | |
Level | EAL2 | |
Product | NC2.vpn+ v2.1.9 | |
Certification Date | 13.09.2021 | |
Expiration Date | 13.09.2026 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/102 | |
Enhanced | ||
Cert Id | C121 | |
Product | NC2.vpn+ v2.1.9 | |
Developer | No.36, Jalan Wangsa Delima 6Pusat Bandar Wangsa Maju53300 Kuala Lumpur Phone:+603 4149 1919Email: [email protected]: https://www.scs.my | |
Category | Network and Network-Related Devices and Systems | |
Type | Network and Network-Related Devices and Systems | |
Scope | The TOE (NC2.vpn+ version 2.1.9) a self-contained box (security appliance) consisting of hardware and software that provides security functionality such as Stateful Traffic Filter Firewall, Virtual Private Network (VPN), Cryptographic Support, Security Audit, Identification and Authentication, Security Management, Secure Communication. From the stateful inspection firewall to the inline intrusion detection & prevention system, various features are built-in to enhance network performance and protect your network from numerous cyber security threats. The TOE resides between one or more internal networks (that the TOE is protecting) and an external network such as the Internet. All information transferred between the internal and external networks shall pass through the TOE. Network packets are inspected in real-time as they pass through the TOE (inbound and outbound protection). Malicious network packets are filtered before they have a chance to reach inside the protected network. | |
Assurance Level | EAL2 | |
Certification Date | 13.09.2021 | |
Expiration Date | 13.09.2026 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/SCS_NC2.vpn_Security_Target_v1.0.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/ISCB-5-RPT-C121-CR-v1.pdf | |
Status | Valid |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2021-09-13', 'expiration_date': '2026-09-13', 'enhanced': {'__update__': {'developer': 'No.36, Jalan Wangsa Delima 6Pusat Bandar Wangsa Maju53300 Kuala Lumpur Phone:+603 4149 1919Email: [email protected]: https://www.scs.my', 'certification_date': '2021-09-13', 'expiration_date': '2026-09-13'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e3112b061e52c8060046952ea4149fea275c0106862bfeec2cec28f195860001', 'txt_hash': 'bf3f2147f8f2a99b2bbf6f7d25aecbb5eb7065e50659d495c71ebcc8fc2df4b1'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '390e98866b65e2f0172250e14b839206a628c219f1c71f85721f0402e6d72cfd', 'txt_hash': '5029b617523f2b69328e6286ddcf02e0e4a9eee2b32bb1291875091083a08f04'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 844757, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 46, '/Title': 'SCS NC2.vpn+ Security Target', '/Author': 'Securelytics', '/Subject': 'SCS Sdn Bhd', '/Creator': 'Microsoft Word', '/CreationDate': "D:20210730035619+00'00'", '/ModDate': "D:20210730035619+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commonriteriaportal.org/']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 704807, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 1, '/CreationDate': "D:20210917005316Z00'00'", '/Creator': 'Word', '/ModDate': "D:20210917005316Z00'00'", '/Producer': 'macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 7}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMS.2': 1, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_FUN.1': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 4, 'ASE_SPD.1': 4, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_ECD.1': 3, 'ASE_TSS.1': 4}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 7, 'FAU_SAR.1': 6, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FCS': {'FCS_CKM.1': 14, 'FCS_CKM.2': 8, 'FCS_CKM.4': 13, 'FCS_COP.1': 9, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACF.1': 8, 'FDP_IFF': 2, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_ATD.1': 6, 'FIA_UAU.2': 6, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 4, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.3': 9, 'FMT_MTD.1': 5, 'FMT_MOF.1': 6, 'FMT_SMF.1': 10, 'FMT_SMR.1': 15, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 7, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_ITC.1': 6, 'FTP_TRP.1': 6, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.DATA_FLOW_CONTROL': 4, 'O.ENCRYPT': 3, 'O.PROTECTED_MANAGEMENT': 4, 'O.LOGGING': 3, 'O.TOECOM': 4}, 'T': {'T.UNAUTHORIZED_DATA': 3, 'T.READ_MODIFY_DATA': 2, 'T.UNAUTHORIZED_ACCESS': 3, 'T.UNDETECTED_ACTIONS': 2, 'T.TOECOM': 3}, 'A': {'A.PHYSICAL': 3, 'A.SINGLE_CONNECTION': 2, 'A.TRUSTED_ADMIN': 3}, 'OE': {'OE.PHYSICAL': 4, 'OE.SINGLE_CONNECTION': 2, 'OE.TRUSTED_ADMIN': 5}}, 'vendor': {'STMicroelectronics': {'STM': 2}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 36}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS v1.2': 3, 'TLS v1.3': 3, 'TLS': 5}}, 'IPsec': {'IPsec': 2}, 'VPN': {'VPN': 21}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 6}, 'CFB': {'CFB': 9}, 'OFB': {'OFB': 6}, 'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
SCS NC2.vpn Security Target v1.0.pdf
. - The cert_filename property was set to
ISCB-5-CERT-C121-CERTIFICATE-v1.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'acd7b1acd37b8f4d966ab3001f1e1352a20354a065129057efb17ffef9594342', 'txt_hash': '4dbd83ed0b941dc82264c946563638e3e5ef5d17ac29152b9224954bab2a75f3'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 809947, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 34, '/CreationDate': "D:20210918094333Z00'00'", '/Creator': 'Word', '/ModDate': "D:20210918094333Z00'00'", '/Producer': 'macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-5-RPT-C121-CR-v1': 34}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 5}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PHYSICAL': 1, 'A.SINGLE_CONNECTION': 1, 'A.TRUSTED_ADMIN': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS v1.2': 1, 'TLS v1.3': 1, 'TLS': 1}}, 'IPsec': {'IPsec': 4}, 'VPN': {'VPN': 11}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}, 'CFB': {'CFB': 3}, 'OFB': {'OFB': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C121-CR-v1.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-5-RPT-C121-CR-v1
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C121-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SCS%20NC2.vpn+%20Security%20Target%20v1.0.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
- The cert property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '13-09-2021', 'expiration_date': '13-09-2026', 'enhanced': {'__update__': {'certification_date': '13-09-2021', 'expiration_date': '13-09-2026'}}}
data.
- The scheme_data property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name NC2.VPN+ v2.1.9 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C121-CERTIFICATE-v1.pdf",
"dgst": "b25e9c1d52bcd897",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C121-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.1.9"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2021-008-C121",
"certification_date": "2021-09-13",
"developer": "System Consultancy Services Sdn. Bhd.",
"enhanced": {
"assurance_level": "EAL2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C121",
"certification_date": "2021-09-13",
"developer": "No.36, Jalan Wangsa Delima 6Pusat Bandar Wangsa Maju53300 Kuala Lumpur Phone:+603 4149 1919Email: [email protected]: https://www.scs.my",
"expiration_date": "2026-09-13",
"mutual_recognition": "CCRA",
"product": "NC2.vpn+ v2.1.9",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/ISCB-5-RPT-C121-CR-v1.pdf",
"scope": "The TOE (NC2.vpn+ version 2.1.9) a self-contained box (security appliance) consisting of hardware and software that provides security functionality such as Stateful Traffic Filter Firewall, Virtual Private Network (VPN), Cryptographic Support, Security Audit, Identification and Authentication, Security Management, Secure Communication. From the stateful inspection firewall to the inline intrusion detection \u0026 prevention system, various features are built-in to enhance network performance and protect your network from numerous cyber security threats. The TOE resides between one or more internal networks (that the TOE is protecting) and an external network such as the Internet. All information transferred between the internal and external networks shall pass through the TOE. Network packets are inspected in real-time as they pass through the TOE (inbound and outbound protection). Malicious network packets are filtered before they have a chance to reach inside the protected network.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/SCS_NC2.vpn_Security_Target_v1.0.pdf",
"type": "Network and Network-Related Devices and Systems"
},
"expiration_date": "2026-09-13",
"level": "EAL2",
"product": "NC2.vpn+ v2.1.9",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/102"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "System Consultancy Services Sdn. Bhd.",
"manufacturer_web": "https://www.scs.my/",
"name": "NC2.VPN+ v2.1.9",
"not_valid_after": "2026-09-13",
"not_valid_before": "2021-09-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C121-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20210917005316Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20210917005316Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext",
"pdf_file_size_bytes": 704807,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-5-RPT-C121-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C121-CR-v1": 34
}
},
"cc_claims": {
"A": {
"A.PHYSICAL": 1,
"A.SINGLE_CONNECTION": 1,
"A.TRUSTED_ADMIN": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 5,
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CFB": {
"CFB": 3
},
"OFB": {
"OFB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 4
},
"TLS": {
"TLS": {
"TLS": 1,
"TLS v1.2": 1,
"TLS v1.3": 1
}
},
"VPN": {
"VPN": 11
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210918094333Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20210918094333Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext",
"pdf_file_size_bytes": 809947,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 34
},
"st_filename": "SCS NC2.vpn Security Target v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PHYSICAL": 3,
"A.SINGLE_CONNECTION": 2,
"A.TRUSTED_ADMIN": 3
},
"O": {
"O.DATA_FLOW_CONTROL": 4,
"O.ENCRYPT": 3,
"O.LOGGING": 3,
"O.PROTECTED_MANAGEMENT": 4,
"O.TOECOM": 4
},
"OE": {
"OE.PHYSICAL": 4,
"OE.SINGLE_CONNECTION": 2,
"OE.TRUSTED_ADMIN": 5
},
"T": {
"T.READ_MODIFY_DATA": 2,
"T.TOECOM": 3,
"T.UNAUTHORIZED_ACCESS": 3,
"T.UNAUTHORIZED_DATA": 3,
"T.UNDETECTED_ACTIONS": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 4,
"ASE_ECD.1": 3,
"ASE_INT.1": 4,
"ASE_OBJ.2": 4,
"ASE_REQ.2": 4,
"ASE_SPD.1": 4,
"ASE_TSS.1": 4
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 7
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 1,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FCS": {
"FCS_CKM.1": 14,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 8,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 13,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 13,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2,
"FDP_IFF": 2,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6
},
"FIA": {
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 6,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 4,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 6,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 9,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 15,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 7,
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_ITC.1": 6,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 6,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CFB": {
"CFB": 9
},
"GCM": {
"GCM": 1
},
"OFB": {
"OFB": 6
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 2
},
"SSH": {
"SSH": 2
},
"TLS": {
"TLS": {
"TLS": 5,
"TLS v1.2": 3,
"TLS v1.3": 3
}
},
"VPN": {
"VPN": 21
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 36
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
},
"STMicroelectronics": {
"STM": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Securelytics",
"/CreationDate": "D:20210730035619+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20210730035619+00\u002700\u0027",
"/Subject": "SCS Sdn Bhd",
"/Title": "SCS NC2.vpn+ Security Target",
"pdf_file_size_bytes": 844757,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commonriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C121-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SCS%20NC2.vpn+%20Security%20Target%20v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "390e98866b65e2f0172250e14b839206a628c219f1c71f85721f0402e6d72cfd",
"txt_hash": "5029b617523f2b69328e6286ddcf02e0e4a9eee2b32bb1291875091083a08f04"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "acd7b1acd37b8f4d966ab3001f1e1352a20354a065129057efb17ffef9594342",
"txt_hash": "4dbd83ed0b941dc82264c946563638e3e5ef5d17ac29152b9224954bab2a75f3"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e3112b061e52c8060046952ea4149fea275c0106862bfeec2cec28f195860001",
"txt_hash": "bf3f2147f8f2a99b2bbf6f7d25aecbb5eb7065e50659d495c71ebcc8fc2df4b1"
}
},
"status": "active"
}