This page was not yet optimized for use on mobile devices.
Protection Profile for General Purpose Operating Systems
Web information
Status: archivedCertification date: 2015-08-14
Archived date: 2016-09-09
Scheme: 🇺🇸
Category: Operating Systems
Security level: None
Certification report
Extracted keywords
Protocols
TLS, DTLSClaims
O.ACCOUNTABILITY, O.INTEGRITY, O.MANAGEMENT, O.PROTECTED_STORAGE, O.PROTECTED_COMMS, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.LOCAL_ATTACK, T.LIMITED_PHYSICAL_ACCESS, A.PLATFORM, A.PROPER_USER, A.PROPER_ADMIN, OE.PLATFORM, OE.PROPER_USER, OE.PROPER_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ALC_TSU_EXT, ATE_IND, AVA_VAN, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM, FCS_CKM_EXT, FCS_COP.1, FCS_RBG_EXT, FCS_DTLS_EXT, FCS_TLSC_EXT, FCS_CKM.1, FCS_CKM.2, FDP_ACF_EXT, FDP_IFC_EXT, FIA_AFL, FIA_UAU, FMT_MOF_EXT, FPT_ACF_EXT, FPT_ASLR_EXT, FPT_SBOP_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_SRP_EXT, FTA_TAB, FTP_ITC_EXT, FTP_TRPEvaluation facilities
Booz Allen HamiltonCertification process
out of scope, The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses theStandards
X.509File metadata
Author | Aerospace Corporation |
---|---|
Creation date | D:20151221144831-05'00' |
Modification date | D:20151221144835-05'00' |
Pages | 10 |
Creator | Acrobat PDFMaker 11 for Word |
Producer | Adobe PDF Library 11.0 |
Profile
Extracted keywords
Symmetric Algorithms
AES, DES, HMACAsymmetric Algorithms
ECDHE, ECDSA, ECC, DHEHash functions
SHA256, SHA384, SHA512Schemes
MAC, Key ExchangeProtocols
SSH, TLS, TLS 1.2, DTLS, DTLS 1.0, DTLS 1.2, IKE, IPsec, VPNRandomness
DRBG, RNG, RBGElliptic Curves
secp256r1, secp384r1, secp521r1Block cipher modes
CBCTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_NULL_WITH_NULL_NULLClaims
O.ACCOUNTABILITY, O.INTEGRITY, O.MANAGEMENT, O.PROTECTED_STORAGE, O.PROTECTED_COMMS, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.LOCAL_ATTACK, T.LIMITED_PHYSICAL_ACCESS, A.PLATFORM, A.PROPER_USER, A.PROPER_ADMIN, OE.PLATFORM, OE.PROPER_USER, OE.PROPER_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_OPE, AGD_PRE, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND, ATE_IND.1, AVA_VAN, AVA_VAN.1, ASE_CCLSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_STG.1, FAU_GEN.2, FCS_COP.1.1, FCS_STO_EXT.1, FCS_RBG_EXT.1, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_TLSC_EXT.3, FCS_TLSC_EXT.4, FCS_DTLS_EXT.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM_EXT.3, FCS_CKM_EXT.3.1, FCS_COP.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_STO_EXT.1.1, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.4.1, FCS_DTLS_EXT.1.1, FCS_DTLS_EXT.1.2, FCS_TLSC_EXT.3.1, FDP_ACF_EXT.1, FDP_IFC_EXT.1, FDP_ACF_EXT.1.1, FDP_IFC_EXT.1.1, FDP_IFC_EXT, FIA_AFL.1, FIA_UAU.5, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.5.1, FIA_UAU.1, FIA_UID.1, FMT_MOF_EXT.1, FMT_MOF_EXT.1.1, FMT_SMR.1, FPT_SBOP_EXT.1, FPT_ASLR_EXT.1, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_ACF_EXT.1, FPT_SRP_EXT.1, FPT_TST_EXT.1, FPT_ACF_EXT.1.1, FPT_ACF_EXT.1.2, FPT_ASLR_EXT.1.1, FPT_SBOP_EXT.1.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_SRP_EXT.1.1, FPT_STM.1, FTA_TAB.1, FTA_TAB.1.1, FTA_SSL.1, FTA_SSL.2, FTP_ITC_EXT.1, FTP_TRP.1, FTP_ITC_EXT.1.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
malfunctionCertification process
out of scope, may even be effectively extended by privileged applications installed onto it. However, these are out of scope of this PP. [USE CASE 1] End User Devices The OS provides a platform to end user devices such as, The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the, code, and so on. However, the way in which the hardware stores and protects these keys is out of scope. If all executable code (including bootloader(s), kernel, device drivers, preloaded applications, kernel. Software loaded for execution directly by the platform (e.g. firststage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator willStandards
FIPS PUB 197, RFC 5246, RFC 4492, RFC 5289, RFC 6460, RFC 6125, RFC 5280, RFC 2560, RFC 5759, RFC 6066, RFC 4347, RFC 6347, X.509File metadata
Creation date | D:20150818140955-04'00' |
---|---|
Modification date | D:20151221150650-05'00' |
Pages | 89 |
References
No references are available for this protection profile.
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 140460, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 10, '/Author': 'Aerospace Corporation', '/Company': 'The Aerospace Corporation', '/CreationDate': "D:20151221144831-05'00'", '/Creator': 'Acrobat PDFMaker 11 for Word', '/ModDate': "D:20151221144835-05'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20151221194817', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=78']}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 1103167, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 89, '/CreationDate': "D:20150818140955-04'00'", '/ModDate': "D:20151221150650-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.niap-ccevs.org/Documents_and_Guidance/ccevs/Entropy%20Documentation%20and%20Assessment%20Clarification.pdf', "javascript:toggle('aactID-idm139800353214128', 'link-aactID-idm139800353214128');", "javascript:toggle('aactID-idm139800352793344', 'link-aactID-idm139800352793344');", "javascript:toggle('aactID-idm139800352874544', 'link-aactID-idm139800352874544');", 'https://www.niap-ccevs.org/pp/', "javascript:toggle('aactID-idm139800352657936', 'link-aactID-idm139800352657936');", "javascript:toggle('aactID-idm139800353207008', 'link-aactID-idm139800353207008');", "javascript:toggle('aactID-idm139800353166752', 'link-aactID-idm139800353166752');", "javascript:toggle('aactID-idm139800352617200', 'link-aactID-idm139800352617200');", "javascript:toggle('aactID-idm139800352942832', 'link-aactID-idm139800352942832');", "javascript:toggle('aactID-idm139800353265984', 'link-aactID-idm139800353265984');", "javascript:toggle('aactID-idm139800353079712', 'link-aactID-idm139800353079712');", "javascript:toggle('aactID-idm139800353345776', 'link-aactID-idm139800353345776');", 'http://www.commoncriteriaportal.org/files/ccfiles/CEMV3.1R4.pdf', "javascript:toggle('aactID-idm139800352866368', 'link-aactID-idm139800352866368');", "javascript:toggle('aactID-idm139800352817328', 'link-aactID-idm139800352817328');", "javascript:toggle('aactID-idm139800352922368', 'link-aactID-idm139800352922368');", 'http://csrc.nist.gov/groups/SMA/ispab/documents/csa_87.txt', "javascript:toggle('aactID-idm139800353059392', 'link-aactID-idm139800353059392');", "javascript:toggle('aactID-idm139800352677664', 'link-aactID-idm139800352677664');", "javascript:toggle('aactID-idm139800353001680', 'link-aactID-idm139800353001680');", "javascript:toggle('aactID-idm139800353377744', 'link-aactID-idm139800353377744');", "javascript:toggle('aactID-idm139800353196752', 'link-aactID-idm139800353196752');", "javascript:toggle('aactID-idm139800352803824', 'link-aactID-idm139800352803824');", "javascript:toggle('aactID-idm139800353420656', 'link-aactID-idm139800353420656');", "javascript:toggle('aactID-idm139800353144720', 'link-aactID-idm139800353144720');", "javascript:toggle('aactID-idm139800352880528', 'link-aactID-idm139800352880528');", "javascript:toggle('aactID-idm139800352929696', 'link-aactID-idm139800352929696');", "javascript:toggle('aactID-idm139800352895456', 'link-aactID-idm139800352895456');", "javascript:toggle('aactID-idm139800352691264', 'link-aactID-idm139800352691264');", "javascript:toggle('aactID-idm139800352919200', 'link-aactID-idm139800352919200');", "javascript:toggle('aactID-idm139800352911536', 'link-aactID-idm139800352911536');", 'https://www.gov.uk/government/collections/end-user-devices-security-guidance', "javascript:toggle('aactID-idm139800353220192', 'link-aactID-idm139800353220192');", 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf', "javascript:toggle('aactID-idm139800352639024', 'link-aactID-idm139800352639024');", "javascript:toggle('aactID-idm139800353090144', 'link-aactID-idm139800353090144');", 'http://www.whitehouse.gov/sites/default/files/omb/memoranda/fy2006/m06-19.pdf', "javascript:toggle('aactID-idm139800353172624', 'link-aactID-idm139800353172624');", 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf', "javascript:toggle('aactID-idm139800352831792', 'link-aactID-idm139800352831792');", "javascript:toggle('aactID-idm139800352727360', 'link-aactID-idm139800352727360');", "javascript:toggle('aactID-idm139800353007040', 'link-aactID-idm139800353007040');", "javascript:toggle('aactID-idm139800352889392', 'link-aactID-idm139800352889392');", "javascript:toggle('aactID-idm139800353121120', 'link-aactID-idm139800353121120');", "javascript:toggle('aactID-idm139800353328480', 'link-aactID-idm139800353328480');", "javascript:toggle('aactID-idm139800352932928', 'link-aactID-idm139800352932928');", "javascript:toggle('aactID-idm139800352752544', 'link-aactID-idm139800352752544');", "javascript:toggle('aactID-idm139800352821968', 'link-aactID-idm139800352821968');", "javascript:toggle('aactID-idm139800352707664', 'link-aactID-idm139800352707664');", "javascript:toggle('aactID-idm139800352844592', 'link-aactID-idm139800352844592');", "javascript:toggle('aactID-idm139800352968080', 'link-aactID-idm139800352968080');", 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf', "javascript:toggle('aactID-idm139800353068800', 'link-aactID-idm139800353068800');", "javascript:toggle('aactID-idm139800352959120', 'link-aactID-idm139800352959120');", "javascript:toggle('aactID-idm139800353102304', 'link-aactID-idm139800353102304');", "javascript:toggle('aactID-idm139800353021696', 'link-aactID-idm139800353021696');", "javascript:toggle('aactID-idm139800353045312', 'link-aactID-idm139800353045312');", "javascript:toggle('aactID-idm139800353244336', 'link-aactID-idm139800353244336');", "javascript:toggle('aactID-idm139800353014272', 'link-aactID-idm139800353014272');"]}}
. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_TSU_EXT': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'APE': {'APE_CCL.1': 1, 'APE_ECD.1': 2, 'APE_INT.1': 1, 'APE_OBJ.2': 1, 'APE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM': 2, 'FCS_CKM_EXT': 1, 'FCS_COP.1': 8, 'FCS_RBG_EXT': 1, 'FCS_DTLS_EXT': 1, 'FCS_TLSC_EXT': 3, 'FCS_CKM.1': 1, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ACF_EXT': 1, 'FDP_IFC_EXT': 1}, 'FIA': {'FIA_AFL': 1, 'FIA_UAU': 1}, 'FMT': {'FMT_MOF_EXT': 1}, 'FPT': {'FPT_ACF_EXT': 1, 'FPT_ASLR_EXT': 1, 'FPT_SBOP_EXT': 1, 'FPT_TST_EXT': 1, 'FPT_TUD_EXT': 2, 'FPT_SRP_EXT': 1}, 'FTA': {'FTA_TAB': 1}, 'FTP': {'FTP_ITC_EXT': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.ACCOUNTABILITY': 1, 'O.INTEGRITY': 1, 'O.MANAGEMENT': 1, 'O.PROTECTED_STORAGE': 1, 'O.PROTECTED_COMMS': 1}, 'T': {'T.NETWORK_ATTACK': 1, 'T.NETWORK_EAVESDROP': 1, 'T.LOCAL_ATTACK': 1, 'T.LIMITED_PHYSICAL_ACCESS': 1}, 'A': {'A.PLATFORM': 1, 'A.PROPER_USER': 1, 'A.PROPER_ADMIN': 1}, 'OE': {'OE.PLATFORM': 1, 'OE.PROPER_USER': 1, 'OE.PROPER_ADMIN': 1}}, 'vendor': {}, 'eval_facility': {'BoozAllenHamilton': {'Booz Allen Hamilton': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}, 'DTLS': {'DTLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the': 1}}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 10}, 'AGD': {'AGD_OPE.1': 12, 'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_PRE.1': 7}, 'ALC': {'ALC_CMC.1': 6, 'ALC_CMS.1': 6, 'ALC_TSU_EXT.1': 6}, 'ATE': {'ATE_IND': 3, 'ATE_IND.1': 5}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.1': 7}, 'ASE': {'ASE_CCL': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 3, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 3, 'FAU_STG.1': 1, 'FAU_GEN.2': 1}, 'FCS': {'FCS_COP.1.1': 8, 'FCS_STO_EXT.1': 2, 'FCS_RBG_EXT.1': 4, 'FCS_TLSC_EXT.1': 13, 'FCS_TLSC_EXT.2': 2, 'FCS_TLSC_EXT.3': 2, 'FCS_TLSC_EXT.4': 2, 'FCS_DTLS_EXT.1': 5, 'FCS_CKM.1': 4, 'FCS_CKM.2': 3, 'FCS_CKM.1.1': 3, 'FCS_CKM.2.1': 2, 'FCS_CKM_EXT.3': 1, 'FCS_CKM_EXT.3.1': 1, 'FCS_COP.1': 7, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1, 'FCS_STO_EXT.1.1': 1, 'FCS_TLSC_EXT.1.1': 2, 'FCS_TLSC_EXT.2.1': 2, 'FCS_TLSC_EXT.1.2': 1, 'FCS_TLSC_EXT.1.3': 1, 'FCS_TLSC_EXT.4.1': 1, 'FCS_DTLS_EXT.1.1': 1, 'FCS_DTLS_EXT.1.2': 1, 'FCS_TLSC_EXT.3.1': 1}, 'FDP': {'FDP_ACF_EXT.1': 2, 'FDP_IFC_EXT.1': 2, 'FDP_ACF_EXT.1.1': 1, 'FDP_IFC_EXT.1.1': 1, 'FDP_IFC_EXT': 1}, 'FIA': {'FIA_AFL.1': 4, 'FIA_UAU.5': 2, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MOF_EXT.1': 5, 'FMT_MOF_EXT.1.1': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_SBOP_EXT.1': 2, 'FPT_ASLR_EXT.1': 2, 'FPT_TUD_EXT.1': 2, 'FPT_TUD_EXT.2': 2, 'FPT_ACF_EXT.1': 3, 'FPT_SRP_EXT.1': 2, 'FPT_TST_EXT.1': 2, 'FPT_ACF_EXT.1.1': 1, 'FPT_ACF_EXT.1.2': 2, 'FPT_ASLR_EXT.1.1': 1, 'FPT_SBOP_EXT.1.1': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.2.1': 1, 'FPT_TUD_EXT.2.2': 2, 'FPT_SRP_EXT.1.1': 1, 'FPT_STM.1': 1}, 'FTA': {'FTA_TAB.1': 1, 'FTA_TAB.1.1': 1, 'FTA_SSL.1': 1, 'FTA_SSL.2': 1}, 'FTP': {'FTP_ITC_EXT.1': 9, 'FTP_TRP.1': 2, 'FTP_ITC_EXT.1.1': 3, 'FTP_TRP.1.1': 2, 'FTP_TRP.1.2': 2, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ACCOUNTABILITY': 1, 'O.INTEGRITY': 5, 'O.MANAGEMENT': 5, 'O.PROTECTED_STORAGE': 3, 'O.PROTECTED_COMMS': 5}, 'T': {'T.NETWORK_ATTACK': 5, 'T.NETWORK_EAVESDROP': 3, 'T.LOCAL_ATTACK': 2, 'T.LIMITED_PHYSICAL_ACCESS': 2}, 'A': {'A.PLATFORM': 3, 'A.PROPER_USER': 3, 'A.PROPER_ADMIN': 3}, 'OE': {'OE.PLATFORM': 3, 'OE.PROPER_USER': 3, 'OE.PROPER_ADMIN': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 15}}, 'DES': {'DES': {'DES': 2}}, 'constructions': {'MAC': {'HMAC': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDHE': 5}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 6}}, 'FF': {'DH': {'DHE': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 1, 'SHA384': 1, 'SHA512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 18}, 'KEX': {'Key Exchange': 4}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 34, 'TLS 1.2': 3}, 'DTLS': {'DTLS': 10, 'DTLS 1.0': 1, 'DTLS 1.2': 3}}, 'IKE': {'IKE': 1}, 'IPsec': {'IPsec': 15}, 'VPN': {'VPN': 18}}, 'randomness': {'PRNG': {'DRBG': 10}, 'RNG': {'RNG': 6, 'RBG': 13}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {'NIST': {'secp256r1': 1, 'secp384r1': 1, 'secp521r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 3, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA256': 1, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 1, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384': 1, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384': 1, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1, 'TLS_NULL_WITH_NULL_NULL': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'RFC': {'RFC 5246': 10, 'RFC 4492': 4, 'RFC 5289': 8, 'RFC 6460': 1, 'RFC 6125': 2, 'RFC 5280': 3, 'RFC 2560': 1, 'RFC 5759': 1, 'RFC 6066': 1, 'RFC 4347': 1, 'RFC 6347': 2}, 'X509': {'X.509': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 4, 'may even be effectively extended by privileged applications installed onto it. However, these are out of scope of this PP. [USE CASE 1] End User Devices The OS provides a platform to end user devices such as': 1, 'The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the': 1, 'code, and so on. However, the way in which the hardware stores and protects these keys is out of scope. If all executable code (including bootloader(s), kernel, device drivers, preloaded applications': 1, 'kernel. Software loaded for execution directly by the platform (e.g. firststage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will': 1}}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a6c74ebb687a1325bdaba3c893d8c45bd2aab25642dd91c14e0a5cb7ecb8ec43', 'txt_hash': '8a004ecf473b1a7fb87951efbdadf4419c9b1546c34f335d1f53793ded2cf321'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6c36070a66cd65c51202fab23c4bb99bf224184e36dee59b891b318ff6ddc7ce', 'txt_hash': '6011977aed91f0bf79f07652cd9182546dc05da172ab202e7f17555971b1ac68'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile for General Purpose Operating Systems was processed.
Raw data
{
"_id": "37bf25fb4ef8d5b7",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "37bf25fb4ef8d5b7",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_os_v4.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 6
},
"ECDH": {
"ECDHE": 5
},
"ECDSA": {
"ECDSA": 7
}
},
"FF": {
"DH": {
"DHE": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PLATFORM": 3,
"A.PROPER_ADMIN": 3,
"A.PROPER_USER": 3
},
"O": {
"O.ACCOUNTABILITY": 1,
"O.INTEGRITY": 5,
"O.MANAGEMENT": 5,
"O.PROTECTED_COMMS": 5,
"O.PROTECTED_STORAGE": 3
},
"OE": {
"OE.PLATFORM": 3,
"OE.PROPER_ADMIN": 3,
"OE.PROPER_USER": 3
},
"T": {
"T.LIMITED_PHYSICAL_ACCESS": 2,
"T.LOCAL_ATTACK": 2,
"T.NETWORK_ATTACK": 5,
"T.NETWORK_EAVESDROP": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 10
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 12,
"AGD_PRE": 1,
"AGD_PRE.1": 7
},
"ALC": {
"ALC_CMC.1": 6,
"ALC_CMS.1": 6,
"ALC_TSU_EXT.1": 6
},
"ASE": {
"ASE_CCL": 1
},
"ATE": {
"ATE_IND": 3,
"ATE_IND.1": 5
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 7
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 3,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 3,
"FAU_GEN.2": 1,
"FAU_STG.1": 1
},
"FCS": {
"FCS_CKM.1": 4,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 3,
"FCS_CKM.2.1": 2,
"FCS_CKM_EXT.3": 1,
"FCS_CKM_EXT.3.1": 1,
"FCS_COP.1": 7,
"FCS_COP.1.1": 8,
"FCS_DTLS_EXT.1": 5,
"FCS_DTLS_EXT.1.1": 1,
"FCS_DTLS_EXT.1.2": 1,
"FCS_RBG_EXT.1": 4,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_STO_EXT.1": 2,
"FCS_STO_EXT.1.1": 1,
"FCS_TLSC_EXT.1": 13,
"FCS_TLSC_EXT.1.1": 2,
"FCS_TLSC_EXT.1.2": 1,
"FCS_TLSC_EXT.1.3": 1,
"FCS_TLSC_EXT.2": 2,
"FCS_TLSC_EXT.2.1": 2,
"FCS_TLSC_EXT.3": 2,
"FCS_TLSC_EXT.3.1": 1,
"FCS_TLSC_EXT.4": 2,
"FCS_TLSC_EXT.4.1": 1
},
"FDP": {
"FDP_ACF_EXT.1": 2,
"FDP_ACF_EXT.1.1": 1,
"FDP_IFC_EXT": 1,
"FDP_IFC_EXT.1": 2,
"FDP_IFC_EXT.1.1": 1
},
"FIA": {
"FIA_AFL.1": 4,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU.1": 1,
"FIA_UAU.5": 2,
"FIA_UAU.5.1": 1,
"FIA_UID.1": 1
},
"FMT": {
"FMT_MOF_EXT.1": 5,
"FMT_MOF_EXT.1.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_ACF_EXT.1": 3,
"FPT_ACF_EXT.1.1": 1,
"FPT_ACF_EXT.1.2": 2,
"FPT_ASLR_EXT.1": 2,
"FPT_ASLR_EXT.1.1": 1,
"FPT_SBOP_EXT.1": 2,
"FPT_SBOP_EXT.1.1": 1,
"FPT_SRP_EXT.1": 2,
"FPT_SRP_EXT.1.1": 1,
"FPT_STM.1": 1,
"FPT_TST_EXT.1": 2,
"FPT_TST_EXT.1.1": 1,
"FPT_TUD_EXT.1": 2,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.2": 2,
"FPT_TUD_EXT.2.1": 1,
"FPT_TUD_EXT.2.2": 2
},
"FTA": {
"FTA_SSL.1": 1,
"FTA_SSL.2": 1,
"FTA_TAB.1": 1,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC_EXT.1": 9,
"FTP_ITC_EXT.1.1": 3,
"FTP_TRP.1": 2,
"FTP_TRP.1.1": 2,
"FTP_TRP.1.2": 2,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the": 1,
"code, and so on. However, the way in which the hardware stores and protects these keys is out of scope. If all executable code (including bootloader(s), kernel, device drivers, preloaded applications": 1,
"kernel. Software loaded for execution directly by the platform (e.g. firststage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will": 1,
"may even be effectively extended by privileged applications installed onto it. However, these are out of scope of this PP. [USE CASE 1] End User Devices The OS provides a platform to end user devices such as": 1,
"out of scope": 4
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"IPsec": {
"IPsec": 15
},
"SSH": {
"SSH": 2
},
"TLS": {
"DTLS": {
"DTLS": 10,
"DTLS 1.0": 1,
"DTLS 1.2": 3
},
"TLS": {
"TLS": 34,
"TLS 1.2": 3
}
},
"VPN": {
"VPN": 18
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 4
},
"MAC": {
"MAC": 18
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"secp256r1": 1,
"secp384r1": 1,
"secp521r1": 1
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 1,
"SHA384": 1,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 10
},
"RNG": {
"RBG": 13,
"RNG": 6
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"FIPS": {
"FIPS PUB 197": 1
},
"RFC": {
"RFC 2560": 1,
"RFC 4347": 1,
"RFC 4492": 4,
"RFC 5246": 10,
"RFC 5280": 3,
"RFC 5289": 8,
"RFC 5759": 1,
"RFC 6066": 1,
"RFC 6125": 2,
"RFC 6347": 2,
"RFC 6460": 1
},
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 15
}
},
"DES": {
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"HMAC": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_NULL_WITH_NULL_NULL": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA256": 1
}
},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20150818140955-04\u002700\u0027",
"/ModDate": "D:20151221150650-05\u002700\u0027",
"pdf_file_size_bytes": 1103167,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"javascript:toggle(\u0027aactID-idm139800353090144\u0027, \u0027link-aactID-idm139800353090144\u0027);",
"javascript:toggle(\u0027aactID-idm139800352817328\u0027, \u0027link-aactID-idm139800352817328\u0027);",
"http://www.whitehouse.gov/sites/default/files/omb/memoranda/fy2006/m06-19.pdf",
"javascript:toggle(\u0027aactID-idm139800353045312\u0027, \u0027link-aactID-idm139800353045312\u0027);",
"https://www.niap-ccevs.org/Documents_and_Guidance/ccevs/Entropy%20Documentation%20and%20Assessment%20Clarification.pdf",
"javascript:toggle(\u0027aactID-idm139800353007040\u0027, \u0027link-aactID-idm139800353007040\u0027);",
"javascript:toggle(\u0027aactID-idm139800352880528\u0027, \u0027link-aactID-idm139800352880528\u0027);",
"javascript:toggle(\u0027aactID-idm139800352617200\u0027, \u0027link-aactID-idm139800352617200\u0027);",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf",
"javascript:toggle(\u0027aactID-idm139800353121120\u0027, \u0027link-aactID-idm139800353121120\u0027);",
"javascript:toggle(\u0027aactID-idm139800353328480\u0027, \u0027link-aactID-idm139800353328480\u0027);",
"javascript:toggle(\u0027aactID-idm139800352803824\u0027, \u0027link-aactID-idm139800352803824\u0027);",
"javascript:toggle(\u0027aactID-idm139800352639024\u0027, \u0027link-aactID-idm139800352639024\u0027);",
"javascript:toggle(\u0027aactID-idm139800352707664\u0027, \u0027link-aactID-idm139800352707664\u0027);",
"javascript:toggle(\u0027aactID-idm139800353420656\u0027, \u0027link-aactID-idm139800353420656\u0027);",
"javascript:toggle(\u0027aactID-idm139800352821968\u0027, \u0027link-aactID-idm139800352821968\u0027);",
"javascript:toggle(\u0027aactID-idm139800352844592\u0027, \u0027link-aactID-idm139800352844592\u0027);",
"javascript:toggle(\u0027aactID-idm139800352677664\u0027, \u0027link-aactID-idm139800352677664\u0027);",
"javascript:toggle(\u0027aactID-idm139800352968080\u0027, \u0027link-aactID-idm139800352968080\u0027);",
"javascript:toggle(\u0027aactID-idm139800352727360\u0027, \u0027link-aactID-idm139800352727360\u0027);",
"javascript:toggle(\u0027aactID-idm139800352691264\u0027, \u0027link-aactID-idm139800352691264\u0027);",
"javascript:toggle(\u0027aactID-idm139800352889392\u0027, \u0027link-aactID-idm139800352889392\u0027);",
"javascript:toggle(\u0027aactID-idm139800352932928\u0027, \u0027link-aactID-idm139800352932928\u0027);",
"javascript:toggle(\u0027aactID-idm139800352922368\u0027, \u0027link-aactID-idm139800352922368\u0027);",
"javascript:toggle(\u0027aactID-idm139800353144720\u0027, \u0027link-aactID-idm139800353144720\u0027);",
"javascript:toggle(\u0027aactID-idm139800352929696\u0027, \u0027link-aactID-idm139800352929696\u0027);",
"javascript:toggle(\u0027aactID-idm139800352919200\u0027, \u0027link-aactID-idm139800352919200\u0027);",
"javascript:toggle(\u0027aactID-idm139800352874544\u0027, \u0027link-aactID-idm139800352874544\u0027);",
"javascript:toggle(\u0027aactID-idm139800353021696\u0027, \u0027link-aactID-idm139800353021696\u0027);",
"javascript:toggle(\u0027aactID-idm139800352895456\u0027, \u0027link-aactID-idm139800352895456\u0027);",
"javascript:toggle(\u0027aactID-idm139800353014272\u0027, \u0027link-aactID-idm139800353014272\u0027);",
"https://www.gov.uk/government/collections/end-user-devices-security-guidance",
"javascript:toggle(\u0027aactID-idm139800353220192\u0027, \u0027link-aactID-idm139800353220192\u0027);",
"javascript:toggle(\u0027aactID-idm139800352959120\u0027, \u0027link-aactID-idm139800352959120\u0027);",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf",
"javascript:toggle(\u0027aactID-idm139800353214128\u0027, \u0027link-aactID-idm139800353214128\u0027);",
"javascript:toggle(\u0027aactID-idm139800352831792\u0027, \u0027link-aactID-idm139800352831792\u0027);",
"javascript:toggle(\u0027aactID-idm139800353196752\u0027, \u0027link-aactID-idm139800353196752\u0027);",
"javascript:toggle(\u0027aactID-idm139800353079712\u0027, \u0027link-aactID-idm139800353079712\u0027);",
"http://www.commoncriteriaportal.org/files/ccfiles/CEMV3.1R4.pdf",
"javascript:toggle(\u0027aactID-idm139800353172624\u0027, \u0027link-aactID-idm139800353172624\u0027);",
"http://csrc.nist.gov/groups/SMA/ispab/documents/csa_87.txt",
"javascript:toggle(\u0027aactID-idm139800352657936\u0027, \u0027link-aactID-idm139800352657936\u0027);",
"javascript:toggle(\u0027aactID-idm139800352942832\u0027, \u0027link-aactID-idm139800352942832\u0027);",
"javascript:toggle(\u0027aactID-idm139800352752544\u0027, \u0027link-aactID-idm139800352752544\u0027);",
"javascript:toggle(\u0027aactID-idm139800353244336\u0027, \u0027link-aactID-idm139800353244336\u0027);",
"javascript:toggle(\u0027aactID-idm139800353001680\u0027, \u0027link-aactID-idm139800353001680\u0027);",
"https://www.niap-ccevs.org/pp/",
"javascript:toggle(\u0027aactID-idm139800352866368\u0027, \u0027link-aactID-idm139800352866368\u0027);",
"javascript:toggle(\u0027aactID-idm139800353207008\u0027, \u0027link-aactID-idm139800353207008\u0027);",
"javascript:toggle(\u0027aactID-idm139800352911536\u0027, \u0027link-aactID-idm139800352911536\u0027);",
"javascript:toggle(\u0027aactID-idm139800353102304\u0027, \u0027link-aactID-idm139800353102304\u0027);",
"javascript:toggle(\u0027aactID-idm139800353345776\u0027, \u0027link-aactID-idm139800353345776\u0027);",
"javascript:toggle(\u0027aactID-idm139800353377744\u0027, \u0027link-aactID-idm139800353377744\u0027);",
"javascript:toggle(\u0027aactID-idm139800352793344\u0027, \u0027link-aactID-idm139800352793344\u0027);",
"javascript:toggle(\u0027aactID-idm139800353068800\u0027, \u0027link-aactID-idm139800353068800\u0027);",
"javascript:toggle(\u0027aactID-idm139800353265984\u0027, \u0027link-aactID-idm139800353265984\u0027);",
"javascript:toggle(\u0027aactID-idm139800353166752\u0027, \u0027link-aactID-idm139800353166752\u0027);",
"javascript:toggle(\u0027aactID-idm139800353059392\u0027, \u0027link-aactID-idm139800353059392\u0027);",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 89
},
"report_filename": "pp_os_v4.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PLATFORM": 1,
"A.PROPER_ADMIN": 1,
"A.PROPER_USER": 1
},
"O": {
"O.ACCOUNTABILITY": 1,
"O.INTEGRITY": 1,
"O.MANAGEMENT": 1,
"O.PROTECTED_COMMS": 1,
"O.PROTECTED_STORAGE": 1
},
"OE": {
"OE.PLATFORM": 1,
"OE.PROPER_ADMIN": 1,
"OE.PROPER_USER": 1
},
"T": {
"T.LIMITED_PHYSICAL_ACCESS": 1,
"T.LOCAL_ATTACK": 1,
"T.NETWORK_ATTACK": 1,
"T.NETWORK_EAVESDROP": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_TSU_EXT": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 2,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 2
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM_EXT": 1,
"FCS_COP.1": 8,
"FCS_DTLS_EXT": 1,
"FCS_RBG_EXT": 1,
"FCS_TLSC_EXT": 3
},
"FDP": {
"FDP_ACF_EXT": 1,
"FDP_IFC_EXT": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_UAU": 1
},
"FMT": {
"FMT_MOF_EXT": 1
},
"FPT": {
"FPT_ACF_EXT": 1,
"FPT_ASLR_EXT": 1,
"FPT_SBOP_EXT": 1,
"FPT_SRP_EXT": 1,
"FPT_TST_EXT": 1,
"FPT_TUD_EXT": 2
},
"FTA": {
"FTA_TAB": 1
},
"FTP": {
"FTP_ITC_EXT": 1,
"FTP_TRP": 1
}
},
"certification_process": {
"OutOfScope": {
"The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"DTLS": {
"DTLS": 1
},
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BoozAllenHamilton": {
"Booz Allen Hamilton": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Aerospace Corporation",
"/Company": "The Aerospace Corporation",
"/CreationDate": "D:20151221144831-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 for Word",
"/ModDate": "D:20151221144835-05\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20151221194817",
"pdf_file_size_bytes": 140460,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=78"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 10
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a6c74ebb687a1325bdaba3c893d8c45bd2aab25642dd91c14e0a5cb7ecb8ec43",
"txt_hash": "8a004ecf473b1a7fb87951efbdadf4419c9b1546c34f335d1f53793ded2cf321"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6c36070a66cd65c51202fab23c4bb99bf224184e36dee59b891b318ff6ddc7ce",
"txt_hash": "6011977aed91f0bf79f07652cd9182546dc05da172ab202e7f17555971b1ac68"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Operating Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile for General Purpose Operating Systems",
"not_valid_after": "2016-09-09",
"not_valid_before": "2015-08-14",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_os_v4.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_os_v4.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "4.0"
}
}