This page was not yet optimized for use on mobile
devices.
Protection Profile for electronic Health Card (eHC) - elektronische Gesundheitskarte (eGK)
Web information
| Status | active |
|---|---|
| Valid from | 25.11.2010 |
| Scheme | 🇩🇪 DE |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, AVA_VAN.5 |
Certification report
Extracted keywords
Symmetric Algorithms
HPCSecurity level
EAL 4, EAL 1, EAL1, EAL3, EAL5, EAL7, EAL2, EAL4, EAL6, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2, APE_OBJ.1, APE_REQ.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0020-V3-2010Certification process
2010, electronic Health Card (eHC) - elektronische Gesundheitskarte (eGK), T-Systems GEI GmbH (confidential document) [6] Common Criteria Protection Profile – electronic Health Card (eHC) – elektronischeStandards
AIS 32, AIS 38, X.509Technical reports
BSI 7125, BSI 2, BSI 7148, BSI 7149File metadata
| Title | Certification Report BSI-CC-PP-0020-V3-2010 |
|---|---|
| Subject | Certification, Protection Profile |
| Keywords | "Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil. electronice Health Card (eHC), elektronische Gesundheitskarte (eGK) Version 2.83" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20101229081029+01'00' |
| Modification date | D:20101229140513+01'00' |
| Pages | 28 |
| Creator | Writer |
| Producer | OpenOffice.org 3.1 |
Protection Profile
Extracted keywords
Symmetric Algorithms
HPCSchemes
MACProtocols
SSLSecurity level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DEL, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1Security Functional Requirements (SFR)
FCS_RND, FCS_RND.1, FCS_RND.1.1, FCS_CKM.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.2, FDP_ACF.1, FDP_UCT.1, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UIT.1, FDP_UCT.1.1, FDP_IFC.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC, FDP_UCT, FDP_UIT, FIA_UAU.4, FIA_AFL.1, FIA_AFL, FIA_UAU.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-CC-PP-0020-V3-2010, BSI-PP-0020, BSI-PP-0020-V2-2007, BSI-PP-0020-V2-2007-MA01, BSI-PP-0020-V2-2007-MA02, BSI-PP-0020-V3, BSI-PP-0002, BSI-PP-****, BSI-CC-PP-0059-2009, BSI-PP-0035Evaluation facilities
SRC Security Research & ConsultingSide-channel analysis
physical probing, side channels, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering, Bleichenbacher attackCertification process
out of scope, access control Application note 32: Keys and other data for creation of qualified signatures are out of scope of this protection profile. The TOE shall meet the requirement “Security attribute based accessStandards
ISO/IEC 7816-2, ISO/IEC 7816-, X.509Technical reports
BSI TR-03116File metadata
| Title | eGK Protection Profile |
|---|---|
| Subject | Protection Profile |
| Keywords | Protection Profile, Schutzprofil, eGK, elektronische Gesundheitskarte, eHC, electronic Health Card, |
| Author | Bertolt Krüger |
| Creation date | D:20100924121058+02'00' |
| Modification date | D:20101229140610+01'00' |
| Pages | 101 |
| Creator | Writer |
| Producer | OpenOffice.org 3.2 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- MICARDO V4.0 R1.0 eHC v1.2 archived
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "248ee1444754e863",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "248ee1444754e863",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP0020_V3b_pdf.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0020-V3-2010": 2,
"BSI-CC-PP-0059-2009": 1,
"BSI-PP-****": 1,
"BSI-PP-0002": 2,
"BSI-PP-0020": 1,
"BSI-PP-0020-V2-2007": 1,
"BSI-PP-0020-V2-2007-MA01": 1,
"BSI-PP-0020-V2-2007-MA02": 1,
"BSI-PP-0020-V3": 1,
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_DEL": 1
},
"ASE": {
"ASE_CCL.1": 6
},
"ATE": {
"ATE_DPT.1": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL4": 9,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 6,
"FCS_CKM.1": 21,
"FCS_CKM.2": 2,
"FCS_CKM.4": 25,
"FCS_CKM.4.1": 1,
"FCS_COP": 58,
"FCS_COP.1": 17,
"FCS_RND": 6,
"FCS_RND.1": 12,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 7,
"FDP_ACC.2": 12,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 2,
"FDP_ACF.1": 14,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 4,
"FDP_ITC.1": 16,
"FDP_ITC.2": 16,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 6,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT": 1,
"FDP_UCT.1": 10,
"FDP_UCT.1.1": 1,
"FDP_UIT": 1,
"FDP_UIT.1": 7,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 12,
"FIA_AFL.1": 5,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 8,
"FIA_UAU.4.1": 1,
"FIA_UID.1": 8,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 6,
"FMT_LIM.1": 20,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 19,
"FMT_LIM.2.1": 2,
"FMT_MSA.3": 4,
"FMT_MTD": 27,
"FMT_MTD.1": 9,
"FMT_SMF.1": 19,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 19,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 10,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 14,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"access control Application note 32: Keys and other data for creation of qualified signatures are out of scope of this protection profile. The TOE shall meet the requirement \u201cSecurity attribute based access": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 12
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"Physical Tampering": 2,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 4,
"physical tampering": 4
},
"SCA": {
"DPA": 1,
"physical probing": 3,
"side channels": 2
},
"other": {
"Bleichenbacher attack": 1,
"reverse engineering": 1
}
},
"standard_id": {
"ISO": {
"ISO/IEC 7816-": 1,
"ISO/IEC 7816-2": 1
},
"X509": {
"X.509": 7
}
},
"symmetric_crypto": {
"AES_competition": {
"HPC": {
"HPC": 17
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03116": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Bertolt Kr\u00fcger",
"/CreationDate": "D:20100924121058+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Protection Profile, Schutzprofil, eGK, elektronische Gesundheitskarte, eHC, electronic Health Card,",
"/ModDate": "D:20101229140610+01\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "Protection Profile",
"/Title": "eGK Protection Profile",
"pdf_file_size_bytes": 860920,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.bundesnetzagentur.de/",
"http://www.gematik.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 101
},
"report_filename": "PP0020_V3a_pdf.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0020-V3-2010": 14
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 2,
"APE_ECD.1": 2,
"APE_INT.1": 2,
"APE_OBJ.1": 1,
"APE_OBJ.2": 2,
"APE_REQ.1": 1,
"APE_REQ.2": 2,
"APE_SPD.1": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 5,
"EAL 4 augmented": 2,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL4": 4,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"2010, electronic Health Card (eHC) - elektronische Gesundheitskarte (eGK), T-Systems GEI GmbH (confidential document) [6] Common Criteria Protection Profile \u2013 electronic Health Card (eHC) \u2013 elektronische": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 38": 1
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"HPC": {
"HPC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 2": 1,
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20101229081029+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil. electronice Health Card (eHC), elektronische Gesundheitskarte (eGK) Version 2.83\"",
"/ModDate": "D:20101229140513+01\u002700\u0027",
"/Producer": "OpenOffice.org 3.1",
"/Subject": "Certification, Protection Profile",
"/Title": "Certification Report BSI-CC-PP-0020-V3-2010",
"pdf_file_size_bytes": 866166,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "5658418a9af78f3b609902ba468dfd510d7e5450496e7b6f12a950eaed61ec37",
"txt_hash": "265211bb866b57a74340b77258f8994ad6d399c27cca6dabde8571ec2c9bf5c7"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "0cf5712e2bbfd0d94ed730e4ef461bc09467ed4bce6d2775208315729f005251",
"txt_hash": "d4e4a6e913fa3f647f7f99b7124f561e800047cdc44a1ea6fb0ca5c29525f90d"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [
[
"2011-04-21",
"Protection Profile for electronic Health Card (eHC) - elektronische Gesundheitskarte (eGK), Version 2.9",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0020_V3_ma1a_pdf.pdf"
]
],
"name": "Protection Profile for electronic Health Card (eHC) - elektronische Gesundheitskarte (eGK)",
"not_valid_after": null,
"not_valid_before": "2010-11-25",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0020_V3b_pdf.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0020_V3a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"AVA_VAN.5"
]
},
"status": "active",
"version": "Version 2.83"
}
}