This page was not yet optimized for use on mobile
devices.
U.S. Government Protection Profile Intrusion Detection System - System for Basic Robustness Environments, Version 1.7
Web information
| Status | archived |
|---|---|
| Valid from | 25.07.2007 |
| Valid until | 01.06.2011 |
| Scheme | 🇺🇸 US |
| Category | Boundary Protection Devices and Systems |
| Security level | ALC_FLR.2, EAL2+ |
Certification report
certification report file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Protection Profile
Extracted keywords
Security level
EAL 2, EAL2, EAL2 augmentedClaims
O.PROTCT, O.IDSCAN, O.IDSENS, O.IDANLZ, O.RESPON, O.EADMIN, O.ACCESS, O.IDAUTH, O.OFLOWS, O.AUDITS, O.INTEGR, O.EXPORT, T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, A.ACCESS, A.DYNMIC, A.ASCOPE, A.PROTCT, A.LOCATE, A.MANAGE, A.NOEVIL, A.NOTRST, A.NOTRUST, OE.AUDIT_PROTECTION, OE.AUDIT_SORT, OE.TIME, OE.INSTAL, OE.INTROP, OE.CREDEN, OE.PERSON, OE.PHYCALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_CMS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.2, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_SAR, FIA_UAU.1, FIA_ATD.1, FIA_UID.1, FIA_UAU, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MTD.1, FMT_SMR.1, FMT_MDT.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_ITA.1, FPT_ITC.1, FPT_ITI.1, FPT_STM.1, FPT_ITA.1.1, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_STM.1.1Side-channel analysis
malfunctionStandards
CCMB-206-09-001File metadata
| Title | 1 PROTECTION PROFILE (PP) INTRODUCTION |
|---|---|
| Author | Glen Lee |
| Creation date | D:20071121091459-05'00' |
| Modification date | D:20071121091530-05'00' |
| Pages | 69 |
| Creator | Acrobat PDFMaker 7.0 for Word |
| Producer | Acrobat Distiller 7.0 (Windows) |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- AirTight Networks SpectraGuard Enterprise, Version 6.5 archived
- Check Point Software Blades R7x archived
- Check Point VSX R67 with Provider-1 R71 archived
- Deep Security 7.5 SP2 archived
- DefensePro Product Family Software Version 5.11 archived
- FireEye v6.0 archived
- HP TippingPoint Intrusion Prevention Systems (S6100N, S5100N, S2500N, S1400N, S660N running TippingPoint OS v3.2.1; S330, S110, S10 running TippingPoint OS v3.1.4) archived
- IBM Internet Security Systems GX6116 Network IPS Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 archived
- IBM Proventia GX 4.1 for GX4004, GX5008, GX5108, GX5208, GX6116 with SiteProtector 2.0 SP 8.1 archived
- Imperva SecureSphere Version 9.0 archived
- JUNOS-FIPS for SRX Series version 10.4R4 archived
- LogRhythm 6.0.4 archived
- McAfee Host Intrusion Prevention 8 and ePolicy Orchestrator 4.5 archived
- Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 archived
- Trend Micro Deep Discovery Inspector 3.2, build 1118 archived
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "44cdd911811b36d2",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "44cdd911811b36d2",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_ids_sys_br_v1.7.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.ASCOPE": 3,
"A.DYNMIC": 3,
"A.LOCATE": 3,
"A.MANAGE": 3,
"A.NOEVIL": 3,
"A.NOTRST": 2,
"A.NOTRUST": 1,
"A.PROTCT": 3
},
"O": {
"O.ACCESS": 10,
"O.AUDITS": 11,
"O.EADMIN": 7,
"O.EXPORT": 6,
"O.IDANLZ": 8,
"O.IDAUTH": 22,
"O.IDSCAN": 7,
"O.IDSENS": 7,
"O.INTEGR": 5,
"O.OFLOWS": 4,
"O.PROTCT": 11,
"O.RESPON": 3
},
"OE": {
"OE.AUDIT_PROTECTION": 3,
"OE.AUDIT_SORT": 4,
"OE.CREDEN": 5,
"OE.INSTAL": 6,
"OE.INTROP": 6,
"OE.PERSON": 4,
"OE.PHYCAL": 5,
"OE.TIME": 3
},
"T": {
"T.COMDIS": 3,
"T.COMINT": 3,
"T.FACCNT": 3,
"T.FALACT": 3,
"T.FALASC": 3,
"T.FALREC": 3,
"T.IMPCON": 3,
"T.INADVE": 3,
"T.INFLUX": 3,
"T.LOSSOF": 3,
"T.MISACT": 3,
"T.MISUSE": 3,
"T.NOHALT": 3,
"T.PRIVIL": 3,
"T.SCNCFG": 3,
"T.SCNMLC": 3,
"T.SCNVUL": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 23,
"ADV_FSP.1": 3,
"ADV_FSP.2": 15,
"ADV_TDS.1": 15
},
"AGD": {
"AGD_OPE.1": 13,
"AGD_PRE.1": 9
},
"ALC": {
"ALC_CMC.2": 9,
"ALC_CMS.1": 1,
"ALC_CMS.2": 7,
"ALC_DEL.1": 6,
"ALC_FLR.2": 16
},
"ATE": {
"ATE_COV.1": 7,
"ATE_FUN.1": 11,
"ATE_IND.2": 8
},
"AVA": {
"AVA_VAN.2": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 4,
"EAL2 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2,
"FAU_SAR": 1,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 2,
"FAU_SAR.2": 7,
"FAU_SAR.2.1": 2,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 2,
"FAU_SEL.1": 6,
"FAU_SEL.1.1": 2,
"FAU_STG.2": 10,
"FAU_STG.2.1": 2,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4": 6,
"FAU_STG.4.1": 2
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 4,
"FIA_ATD.1.1": 2,
"FIA_UAU": 1,
"FIA_UAU.1": 6,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UID.1": 7,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2
},
"FMT": {
"FMT_MDT.1": 1,
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 2,
"FMT_MTD.1": 9,
"FMT_MTD.1.1": 2,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITA.1": 4,
"FPT_ITA.1.1": 2,
"FPT_ITC.1": 5,
"FPT_ITC.1.1": 2,
"FPT_ITI.1": 5,
"FPT_ITI.1.1": 2,
"FPT_ITI.1.2": 1,
"FPT_STM.1": 6,
"FPT_STM.1.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"CC": {
"CCMB-206-09-001": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Glen Lee",
"/Company": "CIST-EAST",
"/CreationDate": "D:20071121091459-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0 for Word",
"/ModDate": "D:20071121091530-05\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/SourceModified": "D:20071109143827",
"/Title": "1 PROTECTION PROFILE (PP) INTRODUCTION",
"pdf_file_size_bytes": 404581,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.niap-ccevs.org/cc-scheme/pp/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 69
},
"report_filename": "",
"report_keywords": null,
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f7ea5e3e29f5b192539d8d5df8a97dc163ebfe723ac1ae6a3d1d1705ec47b822",
"txt_hash": "9c481102e53c2dbee99416c5b764b867aee7a26ff55690821ae185488a968aa2"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
"txt_hash": null
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Boundary Protection Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "U.S. Government Protection Profile Intrusion Detection System - System for Basic Robustness Environments, Version 1.7",
"not_valid_after": "2011-06-01",
"not_valid_before": "2007-07-25",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf",
"report_link": "https://www.commoncriteriaportal.org#no_cert",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2+"
]
},
"status": "archived",
"version": "1.7"
}
}