This page was not yet optimized for use on mobile devices.
Extended Package for Mobile Device Management Agents, Version 2.0
Web information ?
Status: archivedCertification date: 2014-12-31
Archived date: 2017-05-21
Scheme: 🇺🇸
Category: Mobility
Security level: EAL1
Certification report ?
Extracted keywords
Claims
O.APPLY_POLICY, O.ACCOUNTABILITY, O.DATA_PROTECTION_TRANSIT, T.MALICIOUS_APPS, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.PHYSICAL_ACCESS, A.CONNECTIVITY, A.MOBILE_DEVICE_PLATFORM, A.PROPER_ADMIN, A.PROPER_USER, OE.IT_ENTERPRISE, OE.MOBILE_DEVICE_PLATFORM, OE.PROPER_ADMIN, OE.PROPER_USER, OE.WIRELESS_NETWORKSecurity Assurance Requirements (SAR)
APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1Security Functional Requirements (SFR)
FAU_ALT_EXT, FAU_GEN.1, FAU_SEL.1, FAU_STG_EXT, FIA_ENR_EXT, FMT_SMF_EXT, FMT_UNR_EXT, FMT_POL_EXTEvaluation facilities
Gossamer SecurityCertification process
out of scope, 2 Protection Profile for Mobile Device Management Validation Report, 24 June 2016 servers, are out of scope. The MDMAEP exists as an extended package (EP) of both the Protection Profile for Mobile DeviceFile metadata
Author | Aerospace Corporation |
---|---|
Creation date | D:20160715130428-04'00' |
Modification date | D:20160715130429-04'00' |
Pages | 10 |
Creator | Acrobat PDFMaker 11 for Word |
Producer | Adobe PDF Library 11.0 |
Profile ?
Extracted keywords
Protocols
TLS, DTLS, IPsec, VPNRandomness
DRBG, RBGClaims
O.DATA_PROTECTION_TRANSIT, O.ACCOUNTABILITY, O.APPLY_POLICY, T.MALICIOUS_APPS, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.PHYSICAL_ACCESS, A.CONNECTIVITY, A.MOBILE_DEVICE_PLATFORM, A.PROPER_ADMIN, A.PROPER_USER, OE.IT_ENTERPRISE, OE.MOBILE_DEVICE_PLATFORM, OE.PROPER_ADMIN, OE.PROPER_USER, OE.WIRELESS_NETWORKSecurity Functional Requirements (SFR)
FAU_ALT_EXT.2, FAU_GEN.1, FAU_SEL.1, FAU_STG_EXT.1, FAU_ALT_EXT.2.1, FAU_NET_EXT.1, FAU_ALT_EXT.1.1, FAU_ALT_EXT.2.2, FAU_GEN.1.1, FAU_SEL.1.1, FAU_STG_EXT.1.1, FAU_GEN.1.2, FCS_STG_EXT, FCS_TLSC_EXT.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.4, FCS_COP.1, FCS_RBG_EXT.1, FCS_TLSC_EXT.2, FCS_DTLS_EXT.1, FCS_STG_EXT.4.1, FCS_STG_EXT.1.1, FCS_STG_EXT.4, FCS_STG_EXT.1, FIA_ENR_EXT.2, FIA_ENR_EXT.2.1, FMT_SMF_EXT.3, FMT_UNR_EXT.1, FMT_POL_EXT.2, FMT_SMF_EXT.3.2, FMT_SMF_EXT.3.1, FMT_SMF.1.1, FMT_UNR_EXT.1.1, FMT_SMF_EXT.2.1, FMT_POL_EXT.2.1, FMT_POL_EXT.2.2, FMT_SMF_EXT.1, FMT_MOF_EXT.1.2, FPT_TST_EXT.2, FPT_ITT.1, FPT_TUD_EXT.1, FPT_ITT_EXT.1, FTP_ITC_EXT, FTP_ITC_EXT.1, FTP_ITC_EXT.1.1, FTP_ITC_EXT.1.2, FTP_ITC_EXT.1.3Certification process
out of scope, which enforce the security policies, and servers which host mobile application repositories, are out of scope. This introduction describes the features of a compliant Target of Evaluation (TOE) and discussesStandards
X.509File metadata
Creation date | D:20150130090509-05'00' |
---|---|
Modification date | D:20150130090509-05'00' |
Pages | 35 |
References ?
- Apple iOS 9.3.2 with MDM Agent archived
- BlackBerry Smartphones with OS 10.3.3 archived
- MobileIron Core / Mobile@Work for Android archived
- Samsung SDS EMM v1.5.1 archived
- VMware AirWatch Mobile Device Management v9.1 archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Extended Package for Mobile Device Management Agents, Version 2.0 was processed.
Raw data
{
"_id": "4fa8c549c1065310",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "4fa8c549c1065310",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_mdm_agent_v2.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIVITY": 2,
"A.MOBILE_DEVICE_PLATFORM": 2,
"A.PROPER_ADMIN": 2,
"A.PROPER_USER": 2
},
"O": {
"O.ACCOUNTABILITY": 3,
"O.APPLY_POLICY": 4,
"O.DATA_PROTECTION_TRANSIT": 4
},
"OE": {
"OE.IT_ENTERPRISE": 2,
"OE.MOBILE_DEVICE_PLATFORM": 2,
"OE.PROPER_ADMIN": 3,
"OE.PROPER_USER": 3,
"OE.WIRELESS_NETWORK": 2
},
"T": {
"T.MALICIOUS_APPS": 3,
"T.NETWORK_ATTACK": 3,
"T.NETWORK_EAVESDROP": 3,
"T.PHYSICAL_ACCESS": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_ALT_EXT.1.1": 1,
"FAU_ALT_EXT.2": 2,
"FAU_ALT_EXT.2.1": 4,
"FAU_ALT_EXT.2.2": 1,
"FAU_GEN.1": 2,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2,
"FAU_NET_EXT.1": 1,
"FAU_SEL.1": 2,
"FAU_SEL.1.1": 1,
"FAU_STG_EXT.1": 2,
"FAU_STG_EXT.1.1": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.2": 2,
"FCS_CKM_EXT.4": 2,
"FCS_COP.1": 3,
"FCS_DTLS_EXT.1": 2,
"FCS_RBG_EXT.1": 2,
"FCS_STG_EXT": 1,
"FCS_STG_EXT.1": 1,
"FCS_STG_EXT.1.1": 1,
"FCS_STG_EXT.4": 1,
"FCS_STG_EXT.4.1": 1,
"FCS_TLSC_EXT.1": 3,
"FCS_TLSC_EXT.2": 1
},
"FIA": {
"FIA_ENR_EXT.2": 2,
"FIA_ENR_EXT.2.1": 1
},
"FMT": {
"FMT_MOF_EXT.1.2": 1,
"FMT_POL_EXT.2": 2,
"FMT_POL_EXT.2.1": 1,
"FMT_POL_EXT.2.2": 1,
"FMT_SMF.1.1": 3,
"FMT_SMF_EXT.1": 2,
"FMT_SMF_EXT.2.1": 1,
"FMT_SMF_EXT.3": 2,
"FMT_SMF_EXT.3.1": 3,
"FMT_SMF_EXT.3.2": 2,
"FMT_UNR_EXT.1": 1,
"FMT_UNR_EXT.1.1": 2
},
"FPT": {
"FPT_ITT.1": 5,
"FPT_ITT_EXT.1": 1,
"FPT_TST_EXT.2": 2,
"FPT_TUD_EXT.1": 1
},
"FTP": {
"FTP_ITC_EXT": 1,
"FTP_ITC_EXT.1": 2,
"FTP_ITC_EXT.1.1": 1,
"FTP_ITC_EXT.1.2": 1,
"FTP_ITC_EXT.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"which enforce the security policies, and servers which host mobile application repositories, are out of scope. This introduction describes the features of a compliant Target of Evaluation (TOE) and discusses": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"TLS": {
"DTLS": {
"DTLS": 5
},
"TLS": {
"TLS": 8
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 3
},
"RNG": {
"RBG": 4
}
},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20150130090509-05\u002700\u0027",
"/ModDate": "D:20150130090509-05\u002700\u0027",
"pdf_file_size_bytes": 661367,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 35
},
"report_filename": "pp_mdm_agent_v2.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIVITY": 1,
"A.MOBILE_DEVICE_PLATFORM": 1,
"A.PROPER_ADMIN": 1,
"A.PROPER_USER": 1
},
"O": {
"O.ACCOUNTABILITY": 1,
"O.APPLY_POLICY": 1,
"O.DATA_PROTECTION_TRANSIT": 1
},
"OE": {
"OE.IT_ENTERPRISE": 1,
"OE.MOBILE_DEVICE_PLATFORM": 1,
"OE.PROPER_ADMIN": 1,
"OE.PROPER_USER": 1,
"OE.WIRELESS_NETWORK": 1
},
"T": {
"T.MALICIOUS_APPS": 1,
"T.NETWORK_ATTACK": 1,
"T.NETWORK_EAVESDROP": 1,
"T.PHYSICAL_ACCESS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ": 1,
"APE_REQ.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_ALT_EXT": 1,
"FAU_GEN.1": 1,
"FAU_SEL.1": 1,
"FAU_STG_EXT": 1
},
"FIA": {
"FIA_ENR_EXT": 1
},
"FMT": {
"FMT_POL_EXT": 1,
"FMT_SMF_EXT": 1,
"FMT_UNR_EXT": 1
}
},
"certification_process": {
"OutOfScope": {
"2 Protection Profile for Mobile Device Management Validation Report, 24 June 2016 servers, are out of scope. The MDMAEP exists as an extended package (EP) of both the Protection Profile for Mobile Device": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 6
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Aerospace Corporation",
"/Company": "The Aerospace Corporation",
"/CreationDate": "D:20160715130428-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 for Word",
"/ModDate": "D:20160715130429-04\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20160715170410",
"pdf_file_size_bytes": 137280,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 10
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b97a556b0db898d0332d85ca89bf71cae1355d4a56f63c9b5e25d7728a66fbc7",
"txt_hash": "d77a49a933c31b1c634c2fceb47b5cf882c00279f9bec0d454fb89996b2a5651"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "89e4aec724f488d023df38ae2b71841531060fd16658eba5213b6b7705fe6233",
"txt_hash": "c8610c49b42ddb2b40883764538159f482039a7f6bfc849037600111142d0b31"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Mobility",
"is_collaborative": false,
"maintenances": [],
"name": "Extended Package for Mobile Device Management Agents, Version 2.0",
"not_valid_after": "2017-05-21",
"not_valid_before": "2014-12-31",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_mdm_agent_v2.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_mdm_agent_v2.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "archived",
"version": "2.0"
}
}