NC2.VPN+ v2.1.9

CSV information ?

Status active
Valid from 13.09.2021
Valid until 13.09.2026
Scheme 🇲🇾 MY
Manufacturer System Consultancy Services Sdn. Bhd.
Category Network and Network-Related Devices and Systems
Security level EAL2

Heuristics summary ?

Certificate ID: ISCB-5-RPT-C121-CR-v1

Certificate ?

Extracted keywords

Security level
EAL2

File metadata

Creation date D:20210917005316Z00'00'
Modification date D:20210917005316Z00'00'
Pages 1
Creator Word
Producer macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Protocols
TLS v1.2, TLS v1.3, TLS, IPsec, VPN
Block cipher modes
CBC, CFB, OFB

Security level
EAL2, EAL 2
Claims
A.PHYSICAL, A.SINGLE_CONNECTION, A.TRUSTED_ADMIN
Certificates
ISCB-5-RPT-C121-CR-v1

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Creation date D:20210918094333Z00'00'
Modification date D:20210918094333Z00'00'
Pages 34
Creator Word
Producer macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Protocols
SSH, TLS v1.2, TLS v1.3, TLS, IPsec, VPN
Block cipher modes
CBC, CFB, OFB, GCM

Vendor
STM, Microsoft

Security level
EAL2
Claims
O.DATA_FLOW_CONTROL, O.ENCRYPT, O.PROTECTED_MANAGEMENT, O.LOGGING, O.TOECOM, T.UNAUTHORIZED_DATA, T.READ_MODIFY_DATA, T.UNAUTHORIZED_ACCESS, T.UNDETECTED_ACTIONS, T.TOECOM, A.PHYSICAL, A.SINGLE_CONNECTION, A.TRUSTED_ADMIN, OE.PHYSICAL, OE.SINGLE_CONNECTION, OE.TRUSTED_ADMIN
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_ECD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN, FAU_GEN.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_IFF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_ATD.1.1, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_STM.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

File metadata

Title SCS NC2.vpn+ Security Target
Subject SCS Sdn Bhd
Author Securelytics
Creation date D:20210730035619+00'00'
Modification date D:20210730035619+00'00'
Pages 46
Creator Microsoft Word

Heuristics ?

Certificate ID: ISCB-5-RPT-C121-CR-v1

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Scheme data ?

Cert No 2021-008-C121
Developer System Consultancy Services Sdn. Bhd.
Level EAL2
Product NC2.vpn+ v2.1.9
Certification Date 13.09.2021
Expiration Date 13.09.2026
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/102
Enhanced
Cert Id C121
Product NC2.vpn+ v2.1.9
Developer No.36, Jalan Wangsa Delima 6Pusat Bandar Wangsa Maju53300 Kuala Lumpur Phone:+603 4149 1919Email: [email protected]: https://www.scs.my
Category Network and Network-Related Devices and Systems
Type Network and Network-Related Devices and Systems
Scope The TOE (NC2.vpn+ version 2.1.9) a self-contained box (security appliance) consisting of hardware and software that provides security functionality such as Stateful Traffic Filter Firewall, Virtual Private Network (VPN), Cryptographic Support, Security Audit, Identification and Authentication, Security Management, Secure Communication. From the stateful inspection firewall to the inline intrusion detection & prevention system, various features are built-in to enhance network performance and protect your network from numerous cyber security threats. The TOE resides between one or more internal networks (that the TOE is protecting) and an external network such as the Internet. All information transferred between the internal and external networks shall pass through the TOE. Network packets are inspected in real-time as they pass through the TOE (inbound and outbound protection). Malicious network packets are filtered before they have a chance to reach inside the protected network.
Assurance Level EAL2
Certification Date 13.09.2021
Expiration Date 13.09.2026
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/SCS_NC2.vpn_Security_Target_v1.0.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/ISCB-5-RPT-C121-CR-v1.pdf
Status Valid

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2021-09-13', 'expiration_date': '2026-09-13', 'enhanced': {'__update__': {'developer': 'No.36, Jalan Wangsa Delima 6Pusat Bandar Wangsa Maju53300 Kuala Lumpur Phone:+603 4149 1919Email: [email protected]: https://www.scs.my', 'certification_date': '2021-09-13', 'expiration_date': '2026-09-13'}}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e3112b061e52c8060046952ea4149fea275c0106862bfeec2cec28f195860001', 'txt_hash': 'bf3f2147f8f2a99b2bbf6f7d25aecbb5eb7065e50659d495c71ebcc8fc2df4b1'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '390e98866b65e2f0172250e14b839206a628c219f1c71f85721f0402e6d72cfd', 'txt_hash': '5029b617523f2b69328e6286ddcf02e0e4a9eee2b32bb1291875091083a08f04'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 844757, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 46, '/Title': 'SCS NC2.vpn+ Security Target', '/Author': 'Securelytics', '/Subject': 'SCS Sdn Bhd', '/Creator': 'Microsoft Word', '/CreationDate': "D:20210730035619+00'00'", '/ModDate': "D:20210730035619+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commonriteriaportal.org/']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 704807, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 1, '/CreationDate': "D:20210917005316Z00'00'", '/Creator': 'Word', '/ModDate': "D:20210917005316Z00'00'", '/Producer': 'macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 7}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMS.2': 1, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_FUN.1': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 4, 'ASE_SPD.1': 4, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_ECD.1': 3, 'ASE_TSS.1': 4}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 7, 'FAU_SAR.1': 6, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FCS': {'FCS_CKM.1': 14, 'FCS_CKM.2': 8, 'FCS_CKM.4': 13, 'FCS_COP.1': 9, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACF.1': 8, 'FDP_IFF': 2, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_ATD.1': 6, 'FIA_UAU.2': 6, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 4, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.3': 9, 'FMT_MTD.1': 5, 'FMT_MOF.1': 6, 'FMT_SMF.1': 10, 'FMT_SMR.1': 15, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 7, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_ITC.1': 6, 'FTP_TRP.1': 6, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.DATA_FLOW_CONTROL': 4, 'O.ENCRYPT': 3, 'O.PROTECTED_MANAGEMENT': 4, 'O.LOGGING': 3, 'O.TOECOM': 4}, 'T': {'T.UNAUTHORIZED_DATA': 3, 'T.READ_MODIFY_DATA': 2, 'T.UNAUTHORIZED_ACCESS': 3, 'T.UNDETECTED_ACTIONS': 2, 'T.TOECOM': 3}, 'A': {'A.PHYSICAL': 3, 'A.SINGLE_CONNECTION': 2, 'A.TRUSTED_ADMIN': 3}, 'OE': {'OE.PHYSICAL': 4, 'OE.SINGLE_CONNECTION': 2, 'OE.TRUSTED_ADMIN': 5}}, 'vendor': {'STMicroelectronics': {'STM': 2}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 36}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS v1.2': 3, 'TLS v1.3': 3, 'TLS': 5}}, 'IPsec': {'IPsec': 2}, 'VPN': {'VPN': 21}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 6}, 'CFB': {'CFB': 9}, 'OFB': {'OFB': 6}, 'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to SCS NC2.vpn Security Target v1.0.pdf.
    • The cert_filename property was set to ISCB-5-CERT-C121-CERTIFICATE-v1.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'acd7b1acd37b8f4d966ab3001f1e1352a20354a065129057efb17ffef9594342', 'txt_hash': '4dbd83ed0b941dc82264c946563638e3e5ef5d17ac29152b9224954bab2a75f3'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 809947, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 34, '/CreationDate': "D:20210918094333Z00'00'", '/Creator': 'Word', '/ModDate': "D:20210918094333Z00'00'", '/Producer': 'macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C121-CR-v1': 34}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 5}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PHYSICAL': 1, 'A.SINGLE_CONNECTION': 1, 'A.TRUSTED_ADMIN': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS v1.2': 1, 'TLS v1.3': 1, 'TLS': 1}}, 'IPsec': {'IPsec': 4}, 'VPN': {'VPN': 11}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}, 'CFB': {'CFB': 3}, 'OFB': {'OFB': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ISCB-5-RPT-C121-CR-v1.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-5-RPT-C121-CR-v1.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C121-CR-v1.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SCS%20NC2.vpn+%20Security%20Target%20v1.0.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '13-09-2021', 'expiration_date': '13-09-2026', 'enhanced': {'__update__': {'certification_date': '13-09-2021', 'expiration_date': '13-09-2026'}}} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NC2.VPN+ v2.1.9 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C121-CERTIFICATE-v1.pdf",
  "dgst": "b25e9c1d52bcd897",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C121-CR-v1",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1.9"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2021-008-C121",
      "certification_date": "2021-09-13",
      "developer": "System Consultancy Services Sdn. Bhd.",
      "enhanced": {
        "assurance_level": "EAL2",
        "category": "Network and Network-Related Devices and Systems",
        "cert_id": "C121",
        "certification_date": "2021-09-13",
        "developer": "No.36, Jalan Wangsa Delima 6Pusat Bandar Wangsa Maju53300 Kuala Lumpur Phone:+603 4149 1919Email: [email protected]: https://www.scs.my",
        "expiration_date": "2026-09-13",
        "mutual_recognition": "CCRA",
        "product": "NC2.vpn+ v2.1.9",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/ISCB-5-RPT-C121-CR-v1.pdf",
        "scope": "The TOE (NC2.vpn+ version 2.1.9) a self-contained box (security appliance) consisting of hardware and software that provides security functionality such as Stateful Traffic Filter Firewall, Virtual Private Network (VPN), Cryptographic Support, Security Audit, Identification and Authentication, Security Management, Secure Communication. From the stateful inspection firewall to the inline intrusion detection \u0026 prevention system, various features are built-in to enhance network performance and protect your network from numerous cyber security threats. The TOE resides between one or more internal networks (that the TOE is protecting) and an external network such as the Internet. All information transferred between the internal and external networks shall pass through the TOE. Network packets are inspected in real-time as they pass through the TOE (inbound and outbound protection). Malicious network packets are filtered before they have a chance to reach inside the protected network.",
        "status": "Valid",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/SCS_NC2.vpn_Security_Target_v1.0.pdf",
        "type": "Network and Network-Related Devices and Systems"
      },
      "expiration_date": "2026-09-13",
      "level": "EAL2",
      "product": "NC2.vpn+ v2.1.9",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/102"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "System Consultancy Services Sdn. Bhd.",
  "manufacturer_web": "https://www.scs.my/",
  "name": "NC2.VPN+ v2.1.9",
  "not_valid_after": "2026-09-13",
  "not_valid_before": "2021-09-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ISCB-5-CERT-C121-CERTIFICATE-v1.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20210917005316Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20210917005316Z00\u002700\u0027",
      "/Producer": "macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext",
      "pdf_file_size_bytes": 704807,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 1
    },
    "report_filename": "ISCB-5-RPT-C121-CR-v1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C121-CR-v1": 34
        }
      },
      "cc_claims": {
        "A": {
          "A.PHYSICAL": 1,
          "A.SINGLE_CONNECTION": 1,
          "A.TRUSTED_ADMIN": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 2": 5,
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CFB": {
          "CFB": 3
        },
        "OFB": {
          "OFB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 4
        },
        "TLS": {
          "TLS": {
            "TLS": 1,
            "TLS v1.2": 1,
            "TLS v1.3": 1
          }
        },
        "VPN": {
          "VPN": 11
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20210918094333Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20210918094333Z00\u002700\u0027",
      "/Producer": "macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext",
      "pdf_file_size_bytes": 809947,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 34
    },
    "st_filename": "SCS NC2.vpn  Security Target v1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.PHYSICAL": 3,
          "A.SINGLE_CONNECTION": 2,
          "A.TRUSTED_ADMIN": 3
        },
        "O": {
          "O.DATA_FLOW_CONTROL": 4,
          "O.ENCRYPT": 3,
          "O.LOGGING": 3,
          "O.PROTECTED_MANAGEMENT": 4,
          "O.TOECOM": 4
        },
        "OE": {
          "OE.PHYSICAL": 4,
          "OE.SINGLE_CONNECTION": 2,
          "OE.TRUSTED_ADMIN": 5
        },
        "T": {
          "T.READ_MODIFY_DATA": 2,
          "T.TOECOM": 3,
          "T.UNAUTHORIZED_ACCESS": 3,
          "T.UNAUTHORIZED_DATA": 3,
          "T.UNDETECTED_ACTIONS": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 4,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 4,
          "ASE_OBJ.2": 4,
          "ASE_REQ.2": 4,
          "ASE_SPD.1": 4,
          "ASE_TSS.1": 4
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 7
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 7,
          "FAU_GEN.1.1": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 14,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 8,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 13,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 9,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 13,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 2,
          "FDP_IFF": 2,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 6
        },
        "FIA": {
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 6,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 4,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 6,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 8,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 9,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 5,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 15,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 6,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 6,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CFB": {
          "CFB": 9
        },
        "GCM": {
          "GCM": 1
        },
        "OFB": {
          "OFB": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 2
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 5,
            "TLS v1.2": 3,
            "TLS v1.3": 3
          }
        },
        "VPN": {
          "VPN": 21
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 36
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        },
        "STMicroelectronics": {
          "STM": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Securelytics",
      "/CreationDate": "D:20210730035619+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/ModDate": "D:20210730035619+00\u002700\u0027",
      "/Subject": "SCS Sdn Bhd",
      "/Title": "SCS NC2.vpn+ Security Target",
      "pdf_file_size_bytes": 844757,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commonriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 46
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C121-CR-v1.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SCS%20NC2.vpn+%20Security%20Target%20v1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "390e98866b65e2f0172250e14b839206a628c219f1c71f85721f0402e6d72cfd",
      "txt_hash": "5029b617523f2b69328e6286ddcf02e0e4a9eee2b32bb1291875091083a08f04"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "acd7b1acd37b8f4d966ab3001f1e1352a20354a065129057efb17ffef9594342",
      "txt_hash": "4dbd83ed0b941dc82264c946563638e3e5ef5d17ac29152b9224954bab2a75f3"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e3112b061e52c8060046952ea4149fea275c0106862bfeec2cec28f195860001",
      "txt_hash": "bf3f2147f8f2a99b2bbf6f7d25aecbb5eb7065e50659d495c71ebcc8fc2df4b1"
    }
  },
  "status": "active"
}