Trend Micro TippingPoint Threat Protection System (TPS) V5.5

CSV information ?

Status active
Valid from 23.06.2023
Valid until 23.06.2028
Scheme 🇲🇾 MY
Manufacturer Trend Micro Inc.
Category Network and Network-Related Devices and Systems
Security level EAL2

Heuristics summary ?

Certificate ID: ISCB-5-RPT-C128-CR-v1a

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES-
Hash functions
MD5
Schemes
MAC
Protocols
SSH, TLS
Libraries
OpenSSL

Security level
EAL 2
Claims
A.ADMIN_CREDENTIALS_SECURE, A.CONNECTIONS, A.LIMITED_FUNCTIONALITY, A.PHYSICAL_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.2, FAU_STG.1, FAU_STG_EXT.3, FCS_SHC_EXT.1, FCS_COP, FCS_RBG_EXT.1, FCS_SHS_EXT.1, FIA_PMG_EXT.1, FIA_AFL.1, FIA_UAU.7, FIA_UIA_EXT.1, FMT_SMF.1, FMT_MOF, FMT_MTD.1, FMT_SMF, FMT_SMR.2, FPT_APW_EXT, FPT_SKP_EXT.1, FPT_TST_EXT.1, FTA_SSL.3, FTA_TAB.1, FTP_ITC.1
Certificates
ISCB-5-RPT-C128-CR-v1a
Evaluation facilities
Leidos

Standards
RFC 4251, ISO/IEC15408, ISO/IEC 18045

File metadata

Title ISCB-5-RPT-C128-CR-v1a
Creation date D:20230709082355Z00'00'
Modification date D:20230709082355Z00'00'
Pages 38
Creator Word
Producer macOS Version 11.7.6 (Build 20G1231) Quartz PDFContext

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-, HMAC, HMAC-SHA-256, HMAC-SHA-512
Asymmetric Algorithms
RSA 2048, ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512
Schemes
MAC
Protocols
SSH, SSL
Randomness
DRBG, RBG
Libraries
OpenSSL
Elliptic Curves
P-256, P-384, P-521
Block cipher modes
CBC, GCM

Security level
EAL2, EAL 2
Claims
O.AUDIT_GENERATION, O.DISPLAY_BANNER, O.IPS_ANALYZE, O.IPS_REACT, O.SECURITY_FUNCTIONALITY_COMPROMISE, O.STRONG_CRYPTOGRAPHY, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.TSF_SELF_TEST, O.VERIFIABLE_UPDATES, O.PROTECTED_COMMUNIATI, O.SECURITY_FUNCTIONALIT, O.PROTECTED_, O.SECURITY_FUNCTIONALITY, O.PROTECTED_COMMUNICATIONS, T.NETWORK_ACCESS, T.NETWORK_DISCLOSURE, T.NETWORK_DOS, T.NETWORK_MISUSE, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.SECURITY_FUNCTIONALITY_FAILURE, T.UNDETECTED_ACTIVITY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.UPDATE_COMPROMISE, A.ADMIN_CREDENTIALS_SECURE, A.CONNECTIONS, A.LIMITED_FUNCTIONALITY, A.PHYSICAL_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.CONNECTIONS, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.UPDATES
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_ARC, ADV_FSP, ADV_TDS, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_CMC, ALC_DEL, ATE_COV.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_FUN, ATE_IND, AVA_VAN.2, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_STG, FAU_STG_EXT, FAU_STG_EXT.1, FAU_STG_EXT.3, FAU_GEN.1, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.3.1, FAU_GEN.2, FAU_GEN.2.1, FAU_STG.1, FAU_STG_EXT.1.3, FCS_CKM, FCS_COP, FCS_RBG_EXT, FCS_SHC_EXT.1, FCS_SHS_EXT.1, FCS_RBG_EXT.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SHC_EXT, FCS_CKM.2, FCS_SHC_EXT.1.1, FCS_SHC_EXT.1.2, FCS_SHC_EXT.1.3, FCS_SHC_EXT.1.4, FCS_SHC_EXT.1.5, FCS_SHC_EXT.1.6, FCS_SHC_EXT.1.7, FCS_SHC_EXT.1.8, FCS_SHC_EXT.1.9, FCS_SHS_EXT, FCS_SHS_EXT.1.1, FCS_SHS_EXT.1.2, FCS_SHS_EXT.1.3, FCS_SHS_EXT.1.4, FCS_SHS_EXT.1.5, FCS_SHS_EXT.1.6, FCS_SHS_EXT.1.7, FCS_SHS_EXT.1.8, FCS_CKM.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FDP_ITC.1, FDP_ITC.2, FIA_AFL.1, FIA_PMG_EXT, FIA_UAU, FIA_UIA_EXT, FIA_UAU_EXT, FIA_PMG_EXT.1, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2, FIA_UAU_EXT.2.1, FIA_AFL, FIA_UAU.7, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.7.1, FIA_UID.1, FMT_MOF, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMR.1, FMT_MTD.1, FMT_SMR.2, FMT_MOF.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_APW_EXT, FPT_SKP_EXT, FPT_STM_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_PTD, FPT_APW_EXT.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_SKP_EXT.1, FPT_SKP, FPT_SKP_EXT.1.1, FPT_STM, FPT_STM_EXT.1, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM.1, FTA_SSL, FTA_TAB, FTA_TAB.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Side-channel analysis
reverse engineering

Standards
FIPS PUB 186-4, FIPS 140-2, FIPS 186-4, PKCS #1, RFC 4253, RFC 4251, RFC 3526, RFC 791, RFC 2460, RFC 792, RFC 2463, RFC 793, RFC 768, RFC 8268, RFC 4252, ISO/IEC 9796-2, ISO/IEC 14888-3, ISO/IEC 18031:2011, X.509

File metadata

Title Trend Micro TPS EAL2 ST_July2023-final
Creation date D:20230709075705Z00'00'
Modification date D:20230709075705Z00'00'
Pages 95
Creator Word
Producer macOS Version 11.7.6 (Build 20G1231) Quartz PDFContext

Heuristics ?

Certificate ID: ISCB-5-RPT-C128-CR-v1a

Extracted SARs

ADV_TDS.1, ASE_CCL.1, ALC_CMC.2, ASE_TSS.1, ALC_DEL.1, ATE_COV.1, ASE_REQ.2, ADV_FSP.2, ADV_ARC.1, AGD_PRE.1, ATE_FUN.1, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, AGD_OPE.1, AVA_VAN.2, ALC_CMS.2, ASE_OBJ.2, ASE_INT.1

Similar certificates

Name Certificate ID
Trend Micro TippingPoint Threat Protection System (TPS) v5.3 CCEVS-VR-VID-11206-2022 Compare

Scheme data ?

Cert No 2023-001-C128
Developer Trend Micro Incorporated
Level EAL2
Product Trend Micro TippingPoint Threat Protection System (TPS) v5.5
Certification Date 23-06-2023
Expiration Date 23-06-2028
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/99
Enhanced
Cert Id C128
Product Trend Micro TippingPoint Threat Protection System (TPS) v5.5
Developer Trend Micro Incorporated11305 Alterra Parkway, Austin,Texas 78758 USAWebsite: www.trendmicro.com
Category Network and Network-Related Devices and Systems
Type Network And Network-Related Devices And Systems
Scope The Target of Evaluation (TOE) is the TippingPoint Threat Protection System (TPS). TPS is a network security platform that offers threat protection, shielding network vulnerabilities, blocking exploits, and defending against known and zero-day attacks (Intrusion Prevention System (IPS) capabilities). The TOE’s specialized hardware-based traffic classification engines enable the IPS to filter accurately at gigabit speeds and microsecond latencies. Unlike software-based systems whose performance may be affected by the number of filters installed, the scalable capacity of the TOE’s hardware engine allows thousands of filters to run simultaneously with no impact on performance or accuracy. The TOE was evaluated as an IPS network device and does not include evaluation of the aforementioned speed or latency claims.
Assurance Level EAL2
Certification Date 23-06-2023
Expiration Date 23-06-2028
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C128/Trend_Micro_TPS_EAL2_ST_July2023-final.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C128/ISCB-5-RPT-C128-CR-v1a.pdf
Status Valid

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c2a66b3d0e2ddf188ec8c8d81e28140b1c73c69da0f53777ee10464e2306e282', 'txt_hash': '5dea87fbd35c78b8678dc9bef934793203e7b70d833973b49519fdccf40f4580'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1607480, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 95, '/Title': 'Trend Micro TPS EAL2 ST_July2023-final', '/Producer': 'macOS Version 11.7.6 (Build 20G1231) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20230709075705Z00'00'", '/ModDate': "D:20230709075705Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 23, 'ADV_FSP.2': 29, 'ADV_TDS.1': 28, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 24, 'AGD_PRE.1': 17, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.2': 17, 'ALC_CMS.2': 14, 'ALC_DEL.1': 11, 'ALC_CMC': 1, 'ALC_DEL': 1}, 'ATE': {'ATE_COV.1': 12, 'ATE_FUN.1': 20, 'ATE_IND.2': 14, 'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.2': 15, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 29, 'ASE_ECD.1': 23, 'ASE_INT.1': 26, 'ASE_OBJ.2': 23, 'ASE_REQ.2': 27, 'ASE_SPD.1': 15, 'ASE_TSS.1': 11, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 30, 'FAU_STG': 19, 'FAU_STG_EXT': 9, 'FAU_STG_EXT.1': 11, 'FAU_STG_EXT.3': 8, 'FAU_GEN.1': 20, 'FAU_STG_EXT.1.1': 2, 'FAU_STG_EXT.1.2': 2, 'FAU_STG_EXT.3.1': 2, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_STG.1': 4, 'FAU_STG_EXT.1.3': 1}, 'FCS': {'FCS_CKM': 18, 'FCS_COP': 67, 'FCS_RBG_EXT': 8, 'FCS_SHC_EXT.1': 10, 'FCS_SHS_EXT.1': 10, 'FCS_RBG_EXT.1': 12, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_SHC_EXT': 4, 'FCS_CKM.2': 12, 'FCS_SHC_EXT.1.1': 2, 'FCS_SHC_EXT.1.2': 2, 'FCS_SHC_EXT.1.3': 2, 'FCS_SHC_EXT.1.4': 2, 'FCS_SHC_EXT.1.5': 2, 'FCS_SHC_EXT.1.6': 2, 'FCS_SHC_EXT.1.7': 2, 'FCS_SHC_EXT.1.8': 2, 'FCS_SHC_EXT.1.9': 3, 'FCS_SHS_EXT': 4, 'FCS_SHS_EXT.1.1': 2, 'FCS_SHS_EXT.1.2': 2, 'FCS_SHS_EXT.1.3': 2, 'FCS_SHS_EXT.1.4': 2, 'FCS_SHS_EXT.1.5': 2, 'FCS_SHS_EXT.1.6': 2, 'FCS_SHS_EXT.1.7': 2, 'FCS_SHS_EXT.1.8': 2, 'FCS_CKM.1': 12, 'FCS_CKM.4': 16, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 5}, 'FDP': {'FDP_ITC.1': 6, 'FDP_ITC.2': 6}, 'FIA': {'FIA_AFL.1': 9, 'FIA_PMG_EXT': 5, 'FIA_UAU': 4, 'FIA_UIA_EXT': 5, 'FIA_UAU_EXT': 5, 'FIA_PMG_EXT.1': 8, 'FIA_PMG_EXT.1.1': 2, 'FIA_UIA_EXT.1': 14, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_UAU_EXT.2': 8, 'FIA_UAU_EXT.2.1': 2, 'FIA_AFL': 2, 'FIA_UAU.7': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_MOF': 17, 'FMT_MTD': 4, 'FMT_SMF': 19, 'FMT_SMR': 4, 'FMT_SMR.1': 6, 'FMT_MTD.1': 5, 'FMT_SMR.2': 5, 'FMT_MOF.1': 2, 'FMT_MTD.1.1': 1, 'FMT_SMF.1': 8, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1}, 'FPT': {'FPT_APW_EXT': 5, 'FPT_SKP_EXT': 5, 'FPT_STM_EXT': 5, 'FPT_TST_EXT': 5, 'FPT_TUD_EXT': 5, 'FPT_PTD': 1, 'FPT_APW_EXT.1': 9, 'FPT_APW_EXT.1.1': 2, 'FPT_APW_EXT.1.2': 2, 'FPT_SKP_EXT.1': 8, 'FPT_SKP': 1, 'FPT_SKP_EXT.1.1': 2, 'FPT_STM': 2, 'FPT_STM_EXT.1': 10, 'FPT_STM_EXT.1.1': 2, 'FPT_STM_EXT.1.2': 2, 'FPT_TST_EXT.1': 9, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1': 9, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_STM.1': 4}, 'FTA': {'FTA_SSL': 8, 'FTA_TAB': 4, 'FTA_TAB.1': 9, 'FTA_SSL.3': 5, 'FTA_SSL.4': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC': 5, 'FTP_TRP': 4, 'FTP_ITC.1': 10, 'FTP_TRP.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT_GENERATION': 5, 'O.DISPLAY_BANNER': 2, 'O.IPS_ANALYZE': 5, 'O.IPS_REACT': 3, 'O.SECURITY_FUNCTIONALITY_COMPROMISE': 2, 'O.STRONG_CRYPTOGRAPHY': 5, 'O.SYSTEM_MONITORING': 2, 'O.TOE_ADMINISTRATION': 5, 'O.TSF_SELF_TEST': 2, 'O.VERIFIABLE_UPDATES': 4, 'O.PROTECTED_COMMUNIATI': 1, 'O.SECURITY_FUNCTIONALIT': 1, 'O.PROTECTED_': 2, 'O.SECURITY_FUNCTIONALITY': 2, 'O.PROTECTED_COMMUNICATIONS': 1}, 'T': {'T.NETWORK_ACCESS': 4, 'T.NETWORK_DISCLOSURE': 4, 'T.NETWORK_DOS': 2, 'T.NETWORK_MISUSE': 4, 'T.PASSWORD_CRACKING': 2, 'T.SECURITY_FUNCTIONALITY_COMPROMISE': 2, 'T.SECURITY_FUNCTIONALITY_FAILURE': 4, 'T.UNDETECTED_ACTIVITY': 4, 'T.UNTRUSTED_COMMUNICATION_CHANNELS': 2, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 1, 'T.UPDATE_COMPROMISE': 3}, 'A': {'A.ADMIN_CREDENTIALS_SECURE': 3, 'A.CONNECTIONS': 2, 'A.LIMITED_FUNCTIONALITY': 2, 'A.PHYSICAL_PROTECTION': 3, 'A.TRUSTED_ADMINISTRATOR': 1, 'A.REGULAR_UPDATES': 1}, 'OE': {'OE.ADMIN_CREDENTIALS_SECURE': 2, 'OE.CONNECTIONS': 2, 'OE.NO_GENERAL_PURPOSE': 1, 'OE.PHYSICAL': 2, 'OE.TRUSTED_ADMIN': 1, 'OE.UPDATES': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 30, 'AES-': 2}}, 'constructions': {'MAC': {'HMAC': 7, 'HMAC-SHA-256': 6, 'HMAC-SHA-512': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 3}, 'ECC': {'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 4}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6}, 'SHA2': {'SHA-256': 11, 'SHA-384': 6, 'SHA-512': 7}}}, 'crypto_scheme': {'MAC': {'MAC': 14}}, 'crypto_protocol': {'SSH': {'SSH': 132}, 'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {'PRNG': {'DRBG': 3}, 'RNG': {'RBG': 2}}, 'cipher_mode': {'CBC': {'CBC': 8}, 'GCM': {'GCM': 7}}, 'ecc_curve': {'NIST': {'P-256': 16, 'P-384': 14, 'P-521': 16}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 13}}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 16, 'FIPS 140-2': 1, 'FIPS 186-4': 1}, 'PKCS': {'PKCS #1': 1}, 'RFC': {'RFC 4253': 5, 'RFC 4251': 2, 'RFC 3526': 7, 'RFC 791': 2, 'RFC 2460': 2, 'RFC 792': 2, 'RFC 2463': 2, 'RFC 793': 2, 'RFC 768': 2, 'RFC 8268': 1, 'RFC 4252': 2}, 'ISO': {'ISO/IEC 9796-2': 1, 'ISO/IEC 14888-3': 3, 'ISO/IEC 18031:2011': 8}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to Trend Micro CM Documentation v1.3.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]}.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '99309f15f60b26c07f5ed331ae1e3921dc1d150e561e39f51190e2c8fd5b3787', 'txt_hash': '445d269c44a0803340999c605f90f76d31b5db778ff4d88c1fab7e5c25ea4655'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1198017, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Title': 'ISCB-5-RPT-C128-CR-v1a', '/Producer': 'macOS Version 11.7.6 (Build 20G1231) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20230709082355Z00'00'", '/ModDate': "D:20230709082355Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C128-CR-v1a': 37}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 5}}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.2': 1, 'FAU_STG.1': 1, 'FAU_STG_EXT.3': 1}, 'FCS': {'FCS_SHC_EXT.1': 4, 'FCS_COP': 3, 'FCS_RBG_EXT.1': 1, 'FCS_SHS_EXT.1': 1}, 'FIA': {'FIA_PMG_EXT.1': 1, 'FIA_AFL.1': 1, 'FIA_UAU.7': 1, 'FIA_UIA_EXT.1': 2}, 'FMT': {'FMT_SMF.1': 1, 'FMT_MOF': 2, 'FMT_MTD.1': 1, 'FMT_SMF': 2, 'FMT_SMR.2': 1}, 'FPT': {'FPT_APW_EXT': 1, 'FPT_SKP_EXT.1': 1, 'FPT_TST_EXT.1': 1}, 'FTA': {'FTA_SSL.3': 1, 'FTA_TAB.1': 1}, 'FTP': {'FTP_ITC.1': 1}}, 'cc_claims': {'A': {'A.ADMIN_CREDENTIALS_SECURE': 1, 'A.CONNECTIONS': 1, 'A.LIMITED_FUNCTIONALITY': 1, 'A.PHYSICAL_PROTECTION': 1, 'A.TRUSTED_ADMINISTRATOR': 1, 'A.REGULAR_UPDATES': 1}}, 'vendor': {}, 'eval_facility': {'Leidos': {'Leidos': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {'SSH': {'SSH': 23}, 'TLS': {'TLS': {'TLS': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 6}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 4251': 1}, 'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ISCB-5-RPT-C128-CR-v1a.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-5-RPT-C128-CR-v1a.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C128-CR-v1a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trend%20Micro%20CM%20Documentation%20v1.3.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Trend Micro TippingPoint Threat Protection System (TPS) V5.5 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C128-CERTIFICATE-v1a.png",
  "dgst": "cc030a9c0c10c2ae",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C128-CR-v1a",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.5"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2023-001-C128",
      "certification_date": "23-06-2023",
      "developer": "Trend Micro Incorporated",
      "enhanced": {
        "assurance_level": "EAL2",
        "category": "Network and Network-Related Devices and Systems",
        "cert_id": "C128",
        "certification_date": "23-06-2023",
        "developer": "Trend Micro Incorporated11305 Alterra Parkway, Austin,Texas 78758 USAWebsite: www.trendmicro.com",
        "expiration_date": "23-06-2028",
        "mutual_recognition": "CCRA",
        "product": "Trend Micro TippingPoint Threat Protection System (TPS) v5.5",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C128/ISCB-5-RPT-C128-CR-v1a.pdf",
        "scope": "The Target of Evaluation (TOE) is the TippingPoint Threat Protection System (TPS). TPS is a network security platform that offers threat protection, shielding network vulnerabilities, blocking exploits, and defending against known and zero-day attacks (Intrusion Prevention System (IPS) capabilities).\nThe TOE\u2019s specialized hardware-based traffic classification engines enable the IPS to filter accurately at gigabit speeds and microsecond latencies. Unlike software-based systems whose performance may be affected by the number of filters installed, the scalable capacity of the TOE\u2019s hardware engine allows thousands of filters to run simultaneously with no impact on performance or accuracy. The TOE was evaluated as an IPS network device and does not include evaluation of the aforementioned speed or latency claims.",
        "status": "Valid",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C128/Trend_Micro_TPS_EAL2_ST_July2023-final.pdf",
        "type": "Network And Network-Related Devices And Systems"
      },
      "expiration_date": "23-06-2028",
      "level": "EAL2",
      "product": "Trend Micro TippingPoint Threat Protection System (TPS) v5.5",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/99"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Trend Micro Inc.",
  "manufacturer_web": "https://www.trendmicro.com",
  "name": "Trend Micro TippingPoint Threat Protection System (TPS) V5.5",
  "not_valid_after": "2028-06-23",
  "not_valid_before": "2023-06-23",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ISCB-5-CERT-C128-CERTIFICATE-v1a.png",
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ISCB-5-RPT-C128-CR-v1a.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C128-CR-v1a": 37
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN_CREDENTIALS_SECURE": 1,
          "A.CONNECTIONS": 1,
          "A.LIMITED_FUNCTIONALITY": 1,
          "A.PHYSICAL_PROTECTION": 1,
          "A.REGULAR_UPDATES": 1,
          "A.TRUSTED_ADMINISTRATOR": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 2": 5
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.2": 1,
          "FAU_STG.1": 1,
          "FAU_STG_EXT.3": 1
        },
        "FCS": {
          "FCS_COP": 3,
          "FCS_RBG_EXT.1": 1,
          "FCS_SHC_EXT.1": 4,
          "FCS_SHS_EXT.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 1,
          "FIA_PMG_EXT.1": 1,
          "FIA_UAU.7": 1,
          "FIA_UIA_EXT.1": 2
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MTD.1": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 1,
          "FMT_SMR.2": 1
        },
        "FPT": {
          "FPT_APW_EXT": 1,
          "FPT_SKP_EXT.1": 1,
          "FPT_TST_EXT.1": 1
        },
        "FTA": {
          "FTA_SSL.3": 1,
          "FTA_TAB.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 6
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 23
        },
        "TLS": {
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        },
        "RFC": {
          "RFC 4251": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES-": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20230709082355Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20230709082355Z00\u002700\u0027",
      "/Producer": "macOS Version 11.7.6 (Build 20G1231) Quartz PDFContext",
      "/Title": "ISCB-5-RPT-C128-CR-v1a",
      "pdf_file_size_bytes": 1198017,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    },
    "st_filename": "Trend Micro CM Documentation v1.3.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 5
          }
        },
        "RSA": {
          "RSA 2048": 3
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN_CREDENTIALS_SECURE": 3,
          "A.CONNECTIONS": 2,
          "A.LIMITED_FUNCTIONALITY": 2,
          "A.PHYSICAL_PROTECTION": 3,
          "A.REGULAR_UPDATES": 1,
          "A.TRUSTED_ADMINISTRATOR": 1
        },
        "O": {
          "O.AUDIT_GENERATION": 5,
          "O.DISPLAY_BANNER": 2,
          "O.IPS_ANALYZE": 5,
          "O.IPS_REACT": 3,
          "O.PROTECTED_": 2,
          "O.PROTECTED_COMMUNIATI": 1,
          "O.PROTECTED_COMMUNICATIONS": 1,
          "O.SECURITY_FUNCTIONALIT": 1,
          "O.SECURITY_FUNCTIONALITY": 2,
          "O.SECURITY_FUNCTIONALITY_COMPROMISE": 2,
          "O.STRONG_CRYPTOGRAPHY": 5,
          "O.SYSTEM_MONITORING": 2,
          "O.TOE_ADMINISTRATION": 5,
          "O.TSF_SELF_TEST": 2,
          "O.VERIFIABLE_UPDATES": 4
        },
        "OE": {
          "OE.ADMIN_CREDENTIALS_SECURE": 2,
          "OE.CONNECTIONS": 2,
          "OE.NO_GENERAL_PURPOSE": 1,
          "OE.PHYSICAL": 2,
          "OE.TRUSTED_ADMIN": 1,
          "OE.UPDATES": 2
        },
        "T": {
          "T.NETWORK_ACCESS": 4,
          "T.NETWORK_DISCLOSURE": 4,
          "T.NETWORK_DOS": 2,
          "T.NETWORK_MISUSE": 4,
          "T.PASSWORD_CRACKING": 2,
          "T.SECURITY_FUNCTIONALITY_COMPROMISE": 2,
          "T.SECURITY_FUNCTIONALITY_FAILURE": 4,
          "T.UNDETECTED_ACTIVITY": 4,
          "T.UNTRUSTED_COMMUNICATION_CHANNELS": 2,
          "T.UPDATE_COMPROMISE": 3,
          "T.WEAK_AUTHENTICATION_ENDPOINTS": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 23,
          "ADV_FSP": 1,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 29,
          "ADV_TDS": 1,
          "ADV_TDS.1": 28
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 24,
          "AGD_PRE": 1,
          "AGD_PRE.1": 17
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.2": 17,
          "ALC_CMS.2": 14,
          "ALC_DEL": 1,
          "ALC_DEL.1": 11
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 29,
          "ASE_ECD": 1,
          "ASE_ECD.1": 23,
          "ASE_INT": 1,
          "ASE_INT.1": 26,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 23,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 27,
          "ASE_SPD": 1,
          "ASE_SPD.1": 15,
          "ASE_TSS": 1,
          "ASE_TSS.1": 11
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 12,
          "ATE_FUN": 1,
          "ATE_FUN.1": 20,
          "ATE_IND": 1,
          "ATE_IND.2": 14
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.2": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 30,
          "FAU_GEN.1": 20,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_STG": 19,
          "FAU_STG.1": 4,
          "FAU_STG_EXT": 9,
          "FAU_STG_EXT.1": 11,
          "FAU_STG_EXT.1.1": 2,
          "FAU_STG_EXT.1.2": 2,
          "FAU_STG_EXT.1.3": 1,
          "FAU_STG_EXT.3": 8,
          "FAU_STG_EXT.3.1": 2
        },
        "FCS": {
          "FCS_CKM": 18,
          "FCS_CKM.1": 12,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 12,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 16,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 67,
          "FCS_COP.1": 5,
          "FCS_RBG_EXT": 8,
          "FCS_RBG_EXT.1": 12,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_RBG_EXT.1.2": 2,
          "FCS_SHC_EXT": 4,
          "FCS_SHC_EXT.1": 10,
          "FCS_SHC_EXT.1.1": 2,
          "FCS_SHC_EXT.1.2": 2,
          "FCS_SHC_EXT.1.3": 2,
          "FCS_SHC_EXT.1.4": 2,
          "FCS_SHC_EXT.1.5": 2,
          "FCS_SHC_EXT.1.6": 2,
          "FCS_SHC_EXT.1.7": 2,
          "FCS_SHC_EXT.1.8": 2,
          "FCS_SHC_EXT.1.9": 3,
          "FCS_SHS_EXT": 4,
          "FCS_SHS_EXT.1": 10,
          "FCS_SHS_EXT.1.1": 2,
          "FCS_SHS_EXT.1.2": 2,
          "FCS_SHS_EXT.1.3": 2,
          "FCS_SHS_EXT.1.4": 2,
          "FCS_SHS_EXT.1.5": 2,
          "FCS_SHS_EXT.1.6": 2,
          "FCS_SHS_EXT.1.7": 2,
          "FCS_SHS_EXT.1.8": 2
        },
        "FDP": {
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 6
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_PMG_EXT": 5,
          "FIA_PMG_EXT.1": 8,
          "FIA_PMG_EXT.1.1": 2,
          "FIA_UAU": 4,
          "FIA_UAU.7": 5,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT": 5,
          "FIA_UAU_EXT.2": 8,
          "FIA_UAU_EXT.2.1": 2,
          "FIA_UIA_EXT": 5,
          "FIA_UIA_EXT.1": 14,
          "FIA_UIA_EXT.1.1": 2,
          "FIA_UIA_EXT.1.2": 2,
          "FIA_UID.1": 2
        },
        "FMT": {
          "FMT_MOF": 17,
          "FMT_MOF.1": 2,
          "FMT_MTD": 4,
          "FMT_MTD.1": 5,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 19,
          "FMT_SMF.1": 8,
          "FMT_SMR": 4,
          "FMT_SMR.1": 6,
          "FMT_SMR.2": 5,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_APW_EXT": 5,
          "FPT_APW_EXT.1": 9,
          "FPT_APW_EXT.1.1": 2,
          "FPT_APW_EXT.1.2": 2,
          "FPT_PTD": 1,
          "FPT_SKP": 1,
          "FPT_SKP_EXT": 5,
          "FPT_SKP_EXT.1": 8,
          "FPT_SKP_EXT.1.1": 2,
          "FPT_STM": 2,
          "FPT_STM.1": 4,
          "FPT_STM_EXT": 5,
          "FPT_STM_EXT.1": 10,
          "FPT_STM_EXT.1.1": 2,
          "FPT_STM_EXT.1.2": 2,
          "FPT_TST_EXT": 5,
          "FPT_TST_EXT.1": 9,
          "FPT_TST_EXT.1.1": 2,
          "FPT_TUD_EXT": 5,
          "FPT_TUD_EXT.1": 9,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 2
        },
        "FTA": {
          "FTA_SSL": 8,
          "FTA_SSL.3": 5,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 5,
          "FTA_SSL.4.1": 1,
          "FTA_TAB": 4,
          "FTA_TAB.1": 9,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 5,
          "FTP_ITC.1": 10,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP": 4,
          "FTP_TRP.1": 5,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        },
        "GCM": {
          "GCM": 7
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 13
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 132
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 14
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 16,
          "P-384": 14,
          "P-521": 16
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          },
          "SHA2": {
            "SHA-256": 11,
            "SHA-384": 6,
            "SHA-512": 7
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 3
        },
        "RNG": {
          "RBG": 2
        }
      },
      "side_channel_analysis": {
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 186-4": 1,
          "FIPS PUB 186-4": 16
        },
        "ISO": {
          "ISO/IEC 14888-3": 3,
          "ISO/IEC 18031:2011": 8,
          "ISO/IEC 9796-2": 1
        },
        "PKCS": {
          "PKCS #1": 1
        },
        "RFC": {
          "RFC 2460": 2,
          "RFC 2463": 2,
          "RFC 3526": 7,
          "RFC 4251": 2,
          "RFC 4252": 2,
          "RFC 4253": 5,
          "RFC 768": 2,
          "RFC 791": 2,
          "RFC 792": 2,
          "RFC 793": 2,
          "RFC 8268": 1
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 30,
            "AES-": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 7,
            "HMAC-SHA-256": 6,
            "HMAC-SHA-512": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20230709075705Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20230709075705Z00\u002700\u0027",
      "/Producer": "macOS Version 11.7.6 (Build 20G1231) Quartz PDFContext",
      "/Title": "Trend Micro TPS EAL2 ST_July2023-final",
      "pdf_file_size_bytes": 1607480,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 95
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C128-CR-v1a.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trend%20Micro%20CM%20Documentation%20v1.3.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": false,
      "download_ok": true,
      "extract_ok": false,
      "pdf_hash": "718e0fa8326d55b3f421273902767d6c87be31dd96c8d75e822c5e7c4404b272",
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "99309f15f60b26c07f5ed331ae1e3921dc1d150e561e39f51190e2c8fd5b3787",
      "txt_hash": "445d269c44a0803340999c605f90f76d31b5db778ff4d88c1fab7e5c25ea4655"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c2a66b3d0e2ddf188ec8c8d81e28140b1c73c69da0f53777ee10464e2306e282",
      "txt_hash": "5dea87fbd35c78b8678dc9bef934793203e7b70d833973b49519fdccf40f4580"
    }
  },
  "status": "active"
}