Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000)
CSV information ?
Status | archived |
---|---|
Valid from | 03.05.2005 |
Valid until | 07.09.2012 |
Scheme | 🇺🇸 US |
Manufacturer | Sourcefire Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL 2Claims
T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, T.EXPOSE, A.ACCESS, A.DYNMIC, A.ASCOPE, A.PROTCT, A.LOCATE, A.MANAGE, A.NOEVIL, A.NOTRSTSecurity Assurance Requirements (SAR)
ACM_CAP.2, ADO_IGS, ADO_IGS.1, AVA_VLA, ASE_OBJ, ASE_REQCertificates
CCEVS-VR-05-0102Side-channel analysis
malfunctionStandards
ISO/IEC 15408-2File metadata
Title | Validation Report for Sourcefire |
---|---|
Author | Vicky Ashby |
Creation date | D:20050526141546-04'00' |
Modification date | D:20050526141623-03'00' |
Pages | 19 |
Creator | Acrobat PDFMaker 5.0 for Word |
Producer | Acrobat Distiller 5.0.5 (Windows) |
Frontpage
Certificate ID | CCEVS-VR-05-0102 |
---|---|
Certified item | Sourcefire, Incorporated Sourcefire Intrusion Detection System (NS 500, NS 1000, NS 2000, NS 2100, NS 3000, MC 1000, and MC 3000 |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
Diffie-HellmanProtocols
SSL, PGPSecurity level
EAL2, EAL 2Claims
O.PROTCT, O.IDSCAN, O.IDSENS, O.IDANLZ, O.RESPON, O.EADMIN, O.ACCESS, O.IDAUTH, O.OFLOWS, O.AUDITS, O.INTEGR, O.EXPORT, O.INSTAL, O.PHYCAL, O.CREDEN, O.PERSON, O.INTROP, O.PR, O.I, O.E, O.AU, T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, T.EXPOSE, A.ACCESS, A.DYNMIC, A.ASCOPE, A.PROTCT, A.LOCATE, A.MANAGE, A.NOEVIL, A.NOTRST, A.ITNET, A.NOTRUSTSecurity Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.2, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_SAR, FDP_ACC.1, FIA_UAU.1, FIA_ATD.1, FIA_UID.1, FIA_UAU, FIA_UAU.1.1, FIA_UAU.1.2, FIA_ATD.1.1, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1, FMT_MOF.1, FMT_MTD.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FMT_MSA, FPT_ITT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_ITT.1.1, FPT_ITA.1, FPT_ITC.1, FPT_ITI.2Side-channel analysis
malfunctionStandards
ISO/IEC 15408, ISO/IEC 15408-2, ISO/IEC 15408-3File metadata
Title | Sourcefire Security Target |
---|---|
Author | CCTL |
Creation date | D:20050525111943-04'00' |
Modification date | D:20050525112204-03'00' |
Pages | 51 |
Creator | Acrobat PDFMaker 5.0 for Word |
Producer | Acrobat Distiller 5.0.5 (Windows) |
Heuristics ?
Extracted SARs
ATE_FUN.1, ATE_COV.1, AGD_ADM.1, AVA_VLA.1, ADV_FSP.1, AVA_SOF.1, AGD_USR.1, ATE_IND.2, ADV_RCR.1, ADV_HLD.1Similar certificates
Scheme data ?
Product | Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000) | |
---|---|---|
Id | CCEVS-VR-VID4017 | |
Url | https://www.niap-ccevs.org/product/4017 | |
Certification Date | 03.06.2005 | |
Expiration Date | None | |
Category | Wireless Monitoring | |
Vendor | Sourcefire, Inc. | |
Evaluation Facility | Leidos Common Criteria Testing Laboratory | |
Scheme | US |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2005-06-03'}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Intrusion Detection System System Protection Profile, Version 1.4', 'pp_eal': 'EAL2', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_ids_sys_v1.4.pdf', 'pp_ids': None}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7c6c1f6436c94006ecfe29d6360707448038f64918de43b6fc96eca93a91d7ad', 'txt_hash': '71f46cf839e0a768e3c2061b0b3b1b773f3769b6dd6403981193ba7390a93895'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1670374, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 51, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'CCTL', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20050525112204-03'00'", '/Title': 'Sourcefire Security Target', '/CreationDate': "D:20050525111943-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 5, 'EAL 2': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 15}, 'ADO': {'ADO_DEL.1': 7, 'ADO_IGS.1': 8}, 'ADV': {'ADV_FSP.1': 10, 'ADV_HLD.1': 13, 'ADV_RCR.1': 6}, 'AGD': {'AGD_ADM.1': 13, 'AGD_USR.1': 11}, 'ATE': {'ATE_COV.1': 6, 'ATE_FUN.1': 11, 'ATE_IND.2': 9}, 'AVA': {'AVA_SOF.1': 8, 'AVA_VLA.1': 11}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 10, 'FAU_SAR.1': 6, 'FAU_SAR.2': 9, 'FAU_SAR.3': 7, 'FAU_SEL.1': 9, 'FAU_STG.2': 11, 'FAU_STG.4': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 1, 'FAU_SAR': 2}, 'FDP': {'FDP_ACC.1': 3}, 'FIA': {'FIA_UAU.1': 9, 'FIA_ATD.1': 6, 'FIA_UID.1': 9, 'FIA_UAU': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1': 1}, 'FMT': {'FMT_MOF.1': 11, 'FMT_MTD.1': 13, 'FMT_SMR.1': 13, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF': 1, 'FMT_MSA': 1}, 'FPT': {'FPT_ITT.1': 8, 'FPT_RVM.1': 10, 'FPT_SEP.1': 10, 'FPT_STM.1': 7, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_ITT.1.1': 1, 'FPT_ITA.1': 1, 'FPT_ITC.1': 1, 'FPT_ITI.2': 1}}, 'cc_claims': {'O': {'O.PROTCT': 10, 'O.IDSCAN': 7, 'O.IDSENS': 7, 'O.IDANLZ': 7, 'O.RESPON': 3, 'O.EADMIN': 6, 'O.ACCESS': 10, 'O.IDAUTH': 21, 'O.OFLOWS': 4, 'O.AUDITS': 10, 'O.INTEGR': 5, 'O.EXPORT': 4, 'O.INSTAL': 5, 'O.PHYCAL': 8, 'O.CREDEN': 4, 'O.PERSON': 6, 'O.INTROP': 4, 'O.PR': 1, 'O.I': 2, 'O.E': 2, 'O.AU': 1}, 'T': {'T.COMINT': 3, 'T.COMDIS': 3, 'T.LOSSOF': 3, 'T.NOHALT': 3, 'T.PRIVIL': 3, 'T.IMPCON': 3, 'T.INFLUX': 3, 'T.FACCNT': 3, 'T.SCNCFG': 3, 'T.SCNMLC': 3, 'T.SCNVUL': 3, 'T.FALACT': 3, 'T.FALREC': 3, 'T.FALASC': 3, 'T.MISUSE': 3, 'T.INADVE': 3, 'T.MISACT': 3, 'T.EXPOSE': 4}, 'A': {'A.ACCESS': 3, 'A.DYNMIC': 3, 'A.ASCOPE': 3, 'A.PROTCT': 3, 'A.LOCATE': 3, 'A.MANAGE': 2, 'A.NOEVIL': 3, 'A.NOTRST': 2, 'A.ITNET': 1, 'A.NOTRUST': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}}, 'PGP': {'PGP': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 15408-2': 1, 'ISO/IEC 15408-3': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
ST_VID4017-ST.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}]}
.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-VR.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-ST.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bc3b61739ac1082c81c477653ecb76ea81fc6c233650ad87bec544e6ead28c9a', 'txt_hash': 'cc10eb0aeb8287b27519ff616f3a5d905f8d746ecb9f00aee3a7d8da45be270f'}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 384618, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 19, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Vicky Ashby', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20050526141623-03'00'", '/Title': 'Validation Report for Sourcefire', '/CreationDate': "D:20050526141546-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-05-0102', 'cert_item': 'Sourcefire, Incorporated Sourcefire Intrusion Detection System (NS 500, NS 1000, NS 2000, NS 2100, NS 3000, MC 1000, and MC 3000', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-05-0102': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 3}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 1}, 'ADO': {'ADO_IGS': 1, 'ADO_IGS.1': 1}, 'AVA': {'AVA_VLA': 1}, 'ASE': {'ASE_OBJ': 1, 'ASE_REQ': 2}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.COMINT': 1, 'T.COMDIS': 1, 'T.LOSSOF': 1, 'T.NOHALT': 1, 'T.PRIVIL': 1, 'T.IMPCON': 1, 'T.INFLUX': 1, 'T.FACCNT': 1, 'T.SCNCFG': 1, 'T.SCNMLC': 1, 'T.SCNVUL': 1, 'T.FALACT': 1, 'T.FALREC': 1, 'T.FALASC': 1, 'T.MISUSE': 1, 'T.INADVE': 1, 'T.MISACT': 1, 'T.EXPOSE': 1}, 'A': {'A.ACCESS': 1, 'A.DYNMIC': 1, 'A.ASCOPE': 1, 'A.PROTCT': 1, 'A.LOCATE': 1, 'A.MANAGE': 1, 'A.NOEVIL': 1, 'A.NOTRST': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408-2': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
None
. - The report_filename property was set to
ST_VID4017-VR.pdf
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-0102-2005
. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "e53cc6b38f5c1c8c",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-0102-2005",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.2.3"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Wireless Monitoring",
"certification_date": "2005-06-03",
"evaluation_facility": "Leidos Common Criteria Testing Laboratory",
"expiration_date": null,
"id": "CCEVS-VR-VID4017",
"product": "Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000)",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/4017",
"vendor": "Sourcefire, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sourcefire Inc.",
"manufacturer_web": "https://www.sourcefire.com/",
"name": "Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000)",
"not_valid_after": "2012-09-07",
"not_valid_before": "2005-05-03",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ST_VID4017-VR.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-05-0102",
"cert_item": "Sourcefire, Incorporated Sourcefire Intrusion Detection System (NS 500, NS 1000, NS 2000, NS 2100, NS 3000, MC 1000, and MC 3000",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-05-0102": 1
}
},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.ASCOPE": 1,
"A.DYNMIC": 1,
"A.LOCATE": 1,
"A.MANAGE": 1,
"A.NOEVIL": 1,
"A.NOTRST": 1,
"A.PROTCT": 1
},
"T": {
"T.COMDIS": 1,
"T.COMINT": 1,
"T.EXPOSE": 1,
"T.FACCNT": 1,
"T.FALACT": 1,
"T.FALASC": 1,
"T.FALREC": 1,
"T.IMPCON": 1,
"T.INADVE": 1,
"T.INFLUX": 1,
"T.LOSSOF": 1,
"T.MISACT": 1,
"T.MISUSE": 1,
"T.NOHALT": 1,
"T.PRIVIL": 1,
"T.SCNCFG": 1,
"T.SCNMLC": 1,
"T.SCNVUL": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 1
},
"ADO": {
"ADO_IGS": 1,
"ADO_IGS.1": 1
},
"ASE": {
"ASE_OBJ": 1,
"ASE_REQ": 2
},
"AVA": {
"AVA_VLA": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"ISO": {
"ISO/IEC 15408-2": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Vicky Ashby",
"/CreationDate": "D:20050526141546-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20050526141623-03\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Validation Report for Sourcefire",
"pdf_file_size_bytes": 384618,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
},
"st_filename": "ST_VID4017-ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.ASCOPE": 3,
"A.DYNMIC": 3,
"A.ITNET": 1,
"A.LOCATE": 3,
"A.MANAGE": 2,
"A.NOEVIL": 3,
"A.NOTRST": 2,
"A.NOTRUST": 1,
"A.PROTCT": 3
},
"O": {
"O.ACCESS": 10,
"O.AU": 1,
"O.AUDITS": 10,
"O.CREDEN": 4,
"O.E": 2,
"O.EADMIN": 6,
"O.EXPORT": 4,
"O.I": 2,
"O.IDANLZ": 7,
"O.IDAUTH": 21,
"O.IDSCAN": 7,
"O.IDSENS": 7,
"O.INSTAL": 5,
"O.INTEGR": 5,
"O.INTROP": 4,
"O.OFLOWS": 4,
"O.PERSON": 6,
"O.PHYCAL": 8,
"O.PR": 1,
"O.PROTCT": 10,
"O.RESPON": 3
},
"T": {
"T.COMDIS": 3,
"T.COMINT": 3,
"T.EXPOSE": 4,
"T.FACCNT": 3,
"T.FALACT": 3,
"T.FALASC": 3,
"T.FALREC": 3,
"T.IMPCON": 3,
"T.INADVE": 3,
"T.INFLUX": 3,
"T.LOSSOF": 3,
"T.MISACT": 3,
"T.MISUSE": 3,
"T.NOHALT": 3,
"T.PRIVIL": 3,
"T.SCNCFG": 3,
"T.SCNMLC": 3,
"T.SCNVUL": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 15
},
"ADO": {
"ADO_DEL.1": 7,
"ADO_IGS.1": 8
},
"ADV": {
"ADV_FSP.1": 10,
"ADV_HLD.1": 13,
"ADV_RCR.1": 6
},
"AGD": {
"AGD_ADM.1": 13,
"AGD_USR.1": 11
},
"ATE": {
"ATE_COV.1": 6,
"ATE_FUN.1": 11,
"ATE_IND.2": 9
},
"AVA": {
"AVA_SOF.1": 8,
"AVA_VLA.1": 11
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 2,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 9,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 7,
"FAU_SAR.3.1": 1,
"FAU_SEL.1": 9,
"FAU_SEL.1.1": 1,
"FAU_STG.2": 11,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4": 9,
"FAU_STG.4.1": 1
},
"FDP": {
"FDP_ACC.1": 3
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 9,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 11,
"FMT_MOF.1.1": 1,
"FMT_MSA": 1,
"FMT_MTD.1": 13,
"FMT_MTD.1.1": 1,
"FMT_SMF": 1,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITA.1": 1,
"FPT_ITC.1": 1,
"FPT_ITI.2": 1,
"FPT_ITT.1": 8,
"FPT_ITT.1.1": 1,
"FPT_RVM.1": 10,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 10,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 7,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 1
},
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 15408-2": 1,
"ISO/IEC 15408-3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "CCTL",
"/CreationDate": "D:20050525111943-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20050525112204-03\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Sourcefire Security Target",
"pdf_file_size_bytes": 1670374,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 51
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL2",
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_ids_sys_v1.4.pdf",
"pp_name": "Intrusion Detection System System Protection Profile, Version 1.4"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-VR.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-ST.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bc3b61739ac1082c81c477653ecb76ea81fc6c233650ad87bec544e6ead28c9a",
"txt_hash": "cc10eb0aeb8287b27519ff616f3a5d905f8d746ecb9f00aee3a7d8da45be270f"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7c6c1f6436c94006ecfe29d6360707448038f64918de43b6fc96eca93a91d7ad",
"txt_hash": "71f46cf839e0a768e3c2061b0b3b1b773f3769b6dd6403981193ba7390a93895"
}
},
"status": "archived"
}