This page was not yet optimized for use on mobile devices.
Extended Package for Mobile Device Management Agents, Version 2.0
Web information
Status: archivedCertification date: 2014-12-31
Archived date: 2017-05-21
Scheme: 🇺🇸
Category: Mobility
Security level: EAL1
Certification report
Extracted keywords
Claims
O.APPLY_POLICY, O.ACCOUNTABILITY, O.DATA_PROTECTION_TRANSIT, T.MALICIOUS_APPS, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.PHYSICAL_ACCESS, A.CONNECTIVITY, A.MOBILE_DEVICE_PLATFORM, A.PROPER_ADMIN, A.PROPER_USER, OE.IT_ENTERPRISE, OE.MOBILE_DEVICE_PLATFORM, OE.PROPER_ADMIN, OE.PROPER_USER, OE.WIRELESS_NETWORKSecurity Assurance Requirements (SAR)
APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1Security Functional Requirements (SFR)
FAU_ALT_EXT, FAU_GEN.1, FAU_SEL.1, FAU_STG_EXT, FIA_ENR_EXT, FMT_SMF_EXT, FMT_UNR_EXT, FMT_POL_EXTEvaluation facilities
Gossamer SecurityCertification process
out of scope, 2 Protection Profile for Mobile Device Management Validation Report, 24 June 2016 servers, are out of scope. The MDMAEP exists as an extended package (EP) of both the Protection Profile for Mobile DeviceFile metadata
Author | Aerospace Corporation |
---|---|
Creation date | D:20160715130428-04'00' |
Modification date | D:20160715130429-04'00' |
Pages | 10 |
Creator | Acrobat PDFMaker 11 for Word |
Producer | Adobe PDF Library 11.0 |
Profile
Extracted keywords
Protocols
TLS, DTLS, IPsec, VPNRandomness
DRBG, RBGClaims
O.DATA_PROTECTION_TRANSIT, O.ACCOUNTABILITY, O.APPLY_POLICY, T.MALICIOUS_APPS, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.PHYSICAL_ACCESS, A.CONNECTIVITY, A.MOBILE_DEVICE_PLATFORM, A.PROPER_ADMIN, A.PROPER_USER, OE.IT_ENTERPRISE, OE.MOBILE_DEVICE_PLATFORM, OE.PROPER_ADMIN, OE.PROPER_USER, OE.WIRELESS_NETWORKSecurity Functional Requirements (SFR)
FAU_ALT_EXT.2, FAU_GEN.1, FAU_SEL.1, FAU_STG_EXT.1, FAU_ALT_EXT.2.1, FAU_NET_EXT.1, FAU_ALT_EXT.1.1, FAU_ALT_EXT.2.2, FAU_GEN.1.1, FAU_SEL.1.1, FAU_STG_EXT.1.1, FAU_GEN.1.2, FCS_STG_EXT, FCS_TLSC_EXT.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.4, FCS_COP.1, FCS_RBG_EXT.1, FCS_TLSC_EXT.2, FCS_DTLS_EXT.1, FCS_STG_EXT.4.1, FCS_STG_EXT.1.1, FCS_STG_EXT.4, FCS_STG_EXT.1, FIA_ENR_EXT.2, FIA_ENR_EXT.2.1, FMT_SMF_EXT.3, FMT_UNR_EXT.1, FMT_POL_EXT.2, FMT_SMF_EXT.3.2, FMT_SMF_EXT.3.1, FMT_SMF.1.1, FMT_UNR_EXT.1.1, FMT_SMF_EXT.2.1, FMT_POL_EXT.2.1, FMT_POL_EXT.2.2, FMT_SMF_EXT.1, FMT_MOF_EXT.1.2, FPT_TST_EXT.2, FPT_ITT.1, FPT_TUD_EXT.1, FPT_ITT_EXT.1, FTP_ITC_EXT, FTP_ITC_EXT.1, FTP_ITC_EXT.1.1, FTP_ITC_EXT.1.2, FTP_ITC_EXT.1.3Certification process
out of scope, which enforce the security policies, and servers which host mobile application repositories, are out of scope. This introduction describes the features of a compliant Target of Evaluation (TOE) and discussesStandards
X.509File metadata
Creation date | D:20150130090509-05'00' |
---|---|
Modification date | D:20150130090509-05'00' |
Pages | 35 |
References
- Apple iOS 9.3.2 with MDM Agent archived
- BlackBerry Smartphones with OS 10.3.3 archived
- MobileIron Core / Mobile@Work for Android archived
- Samsung SDS EMM v1.5.1 archived
- VMware AirWatch Mobile Device Management v9.1 archived
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 137280, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 10, '/Author': 'Aerospace Corporation', '/Company': 'The Aerospace Corporation', '/CreationDate': "D:20160715130428-04'00'", '/Creator': 'Acrobat PDFMaker 11 for Word', '/ModDate': "D:20160715130429-04'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20160715170410', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 661367, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 35, '/CreationDate': "D:20150130090509-05'00'", '/ModDate': "D:20150130090509-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'APE': {'APE_REQ': 1, 'APE_CCL.1': 1, 'APE_ECD.1': 1, 'APE_INT.1': 1, 'APE_OBJ.2': 1, 'APE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ALT_EXT': 1, 'FAU_GEN.1': 1, 'FAU_SEL.1': 1, 'FAU_STG_EXT': 1}, 'FIA': {'FIA_ENR_EXT': 1}, 'FMT': {'FMT_SMF_EXT': 1, 'FMT_UNR_EXT': 1, 'FMT_POL_EXT': 1}}, 'cc_claims': {'O': {'O.APPLY_POLICY': 1, 'O.ACCOUNTABILITY': 1, 'O.DATA_PROTECTION_TRANSIT': 1}, 'T': {'T.MALICIOUS_APPS': 1, 'T.NETWORK_ATTACK': 1, 'T.NETWORK_EAVESDROP': 1, 'T.PHYSICAL_ACCESS': 1}, 'A': {'A.CONNECTIVITY': 1, 'A.MOBILE_DEVICE_PLATFORM': 1, 'A.PROPER_ADMIN': 1, 'A.PROPER_USER': 1}, 'OE': {'OE.IT_ENTERPRISE': 1, 'OE.MOBILE_DEVICE_PLATFORM': 1, 'OE.PROPER_ADMIN': 1, 'OE.PROPER_USER': 1, 'OE.WIRELESS_NETWORK': 1}}, 'vendor': {}, 'eval_facility': {'Gossamer': {'Gossamer Security': 6}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '2 Protection Profile for Mobile Device Management Validation Report, 24 June 2016 servers, are out of scope. The MDMAEP exists as an extended package (EP) of both the Protection Profile for Mobile Device': 1}}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_ALT_EXT.2': 2, 'FAU_GEN.1': 2, 'FAU_SEL.1': 2, 'FAU_STG_EXT.1': 2, 'FAU_ALT_EXT.2.1': 4, 'FAU_NET_EXT.1': 1, 'FAU_ALT_EXT.1.1': 1, 'FAU_ALT_EXT.2.2': 1, 'FAU_GEN.1.1': 2, 'FAU_SEL.1.1': 1, 'FAU_STG_EXT.1.1': 1, 'FAU_GEN.1.2': 2}, 'FCS': {'FCS_STG_EXT': 1, 'FCS_TLSC_EXT.1': 3, 'FCS_CKM.1': 2, 'FCS_CKM.2': 2, 'FCS_CKM_EXT.4': 2, 'FCS_COP.1': 3, 'FCS_RBG_EXT.1': 2, 'FCS_TLSC_EXT.2': 1, 'FCS_DTLS_EXT.1': 2, 'FCS_STG_EXT.4.1': 1, 'FCS_STG_EXT.1.1': 1, 'FCS_STG_EXT.4': 1, 'FCS_STG_EXT.1': 1}, 'FIA': {'FIA_ENR_EXT.2': 2, 'FIA_ENR_EXT.2.1': 1}, 'FMT': {'FMT_SMF_EXT.3': 2, 'FMT_UNR_EXT.1': 1, 'FMT_POL_EXT.2': 2, 'FMT_SMF_EXT.3.2': 2, 'FMT_SMF_EXT.3.1': 3, 'FMT_SMF.1.1': 3, 'FMT_UNR_EXT.1.1': 2, 'FMT_SMF_EXT.2.1': 1, 'FMT_POL_EXT.2.1': 1, 'FMT_POL_EXT.2.2': 1, 'FMT_SMF_EXT.1': 2, 'FMT_MOF_EXT.1.2': 1}, 'FPT': {'FPT_TST_EXT.2': 2, 'FPT_ITT.1': 5, 'FPT_TUD_EXT.1': 1, 'FPT_ITT_EXT.1': 1}, 'FTP': {'FTP_ITC_EXT': 1, 'FTP_ITC_EXT.1': 2, 'FTP_ITC_EXT.1.1': 1, 'FTP_ITC_EXT.1.2': 1, 'FTP_ITC_EXT.1.3': 1}}, 'cc_claims': {'O': {'O.DATA_PROTECTION_TRANSIT': 4, 'O.ACCOUNTABILITY': 3, 'O.APPLY_POLICY': 4}, 'T': {'T.MALICIOUS_APPS': 3, 'T.NETWORK_ATTACK': 3, 'T.NETWORK_EAVESDROP': 3, 'T.PHYSICAL_ACCESS': 3}, 'A': {'A.CONNECTIVITY': 2, 'A.MOBILE_DEVICE_PLATFORM': 2, 'A.PROPER_ADMIN': 2, 'A.PROPER_USER': 2}, 'OE': {'OE.IT_ENTERPRISE': 2, 'OE.MOBILE_DEVICE_PLATFORM': 2, 'OE.PROPER_ADMIN': 3, 'OE.PROPER_USER': 3, 'OE.WIRELESS_NETWORK': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 8}, 'DTLS': {'DTLS': 5}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 1}}, 'randomness': {'PRNG': {'DRBG': 3}, 'RNG': {'RBG': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'which enforce the security policies, and servers which host mobile application repositories, are out of scope. This introduction describes the features of a compliant Target of Evaluation (TOE) and discusses': 1}}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b97a556b0db898d0332d85ca89bf71cae1355d4a56f63c9b5e25d7728a66fbc7', 'txt_hash': 'd77a49a933c31b1c634c2fceb47b5cf882c00279f9bec0d454fb89996b2a5651'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '89e4aec724f488d023df38ae2b71841531060fd16658eba5213b6b7705fe6233', 'txt_hash': 'c8610c49b42ddb2b40883764538159f482039a7f6bfc849037600111142d0b31'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Extended Package for Mobile Device Management Agents, Version 2.0 was processed.
Raw data
{
"_id": "4fa8c549c1065310",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "4fa8c549c1065310",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_mdm_agent_v2.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIVITY": 2,
"A.MOBILE_DEVICE_PLATFORM": 2,
"A.PROPER_ADMIN": 2,
"A.PROPER_USER": 2
},
"O": {
"O.ACCOUNTABILITY": 3,
"O.APPLY_POLICY": 4,
"O.DATA_PROTECTION_TRANSIT": 4
},
"OE": {
"OE.IT_ENTERPRISE": 2,
"OE.MOBILE_DEVICE_PLATFORM": 2,
"OE.PROPER_ADMIN": 3,
"OE.PROPER_USER": 3,
"OE.WIRELESS_NETWORK": 2
},
"T": {
"T.MALICIOUS_APPS": 3,
"T.NETWORK_ATTACK": 3,
"T.NETWORK_EAVESDROP": 3,
"T.PHYSICAL_ACCESS": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_ALT_EXT.1.1": 1,
"FAU_ALT_EXT.2": 2,
"FAU_ALT_EXT.2.1": 4,
"FAU_ALT_EXT.2.2": 1,
"FAU_GEN.1": 2,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2,
"FAU_NET_EXT.1": 1,
"FAU_SEL.1": 2,
"FAU_SEL.1.1": 1,
"FAU_STG_EXT.1": 2,
"FAU_STG_EXT.1.1": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.2": 2,
"FCS_CKM_EXT.4": 2,
"FCS_COP.1": 3,
"FCS_DTLS_EXT.1": 2,
"FCS_RBG_EXT.1": 2,
"FCS_STG_EXT": 1,
"FCS_STG_EXT.1": 1,
"FCS_STG_EXT.1.1": 1,
"FCS_STG_EXT.4": 1,
"FCS_STG_EXT.4.1": 1,
"FCS_TLSC_EXT.1": 3,
"FCS_TLSC_EXT.2": 1
},
"FIA": {
"FIA_ENR_EXT.2": 2,
"FIA_ENR_EXT.2.1": 1
},
"FMT": {
"FMT_MOF_EXT.1.2": 1,
"FMT_POL_EXT.2": 2,
"FMT_POL_EXT.2.1": 1,
"FMT_POL_EXT.2.2": 1,
"FMT_SMF.1.1": 3,
"FMT_SMF_EXT.1": 2,
"FMT_SMF_EXT.2.1": 1,
"FMT_SMF_EXT.3": 2,
"FMT_SMF_EXT.3.1": 3,
"FMT_SMF_EXT.3.2": 2,
"FMT_UNR_EXT.1": 1,
"FMT_UNR_EXT.1.1": 2
},
"FPT": {
"FPT_ITT.1": 5,
"FPT_ITT_EXT.1": 1,
"FPT_TST_EXT.2": 2,
"FPT_TUD_EXT.1": 1
},
"FTP": {
"FTP_ITC_EXT": 1,
"FTP_ITC_EXT.1": 2,
"FTP_ITC_EXT.1.1": 1,
"FTP_ITC_EXT.1.2": 1,
"FTP_ITC_EXT.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"which enforce the security policies, and servers which host mobile application repositories, are out of scope. This introduction describes the features of a compliant Target of Evaluation (TOE) and discusses": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"TLS": {
"DTLS": {
"DTLS": 5
},
"TLS": {
"TLS": 8
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 3
},
"RNG": {
"RBG": 4
}
},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20150130090509-05\u002700\u0027",
"/ModDate": "D:20150130090509-05\u002700\u0027",
"pdf_file_size_bytes": 661367,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 35
},
"report_filename": "pp_mdm_agent_v2.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIVITY": 1,
"A.MOBILE_DEVICE_PLATFORM": 1,
"A.PROPER_ADMIN": 1,
"A.PROPER_USER": 1
},
"O": {
"O.ACCOUNTABILITY": 1,
"O.APPLY_POLICY": 1,
"O.DATA_PROTECTION_TRANSIT": 1
},
"OE": {
"OE.IT_ENTERPRISE": 1,
"OE.MOBILE_DEVICE_PLATFORM": 1,
"OE.PROPER_ADMIN": 1,
"OE.PROPER_USER": 1,
"OE.WIRELESS_NETWORK": 1
},
"T": {
"T.MALICIOUS_APPS": 1,
"T.NETWORK_ATTACK": 1,
"T.NETWORK_EAVESDROP": 1,
"T.PHYSICAL_ACCESS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ": 1,
"APE_REQ.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_ALT_EXT": 1,
"FAU_GEN.1": 1,
"FAU_SEL.1": 1,
"FAU_STG_EXT": 1
},
"FIA": {
"FIA_ENR_EXT": 1
},
"FMT": {
"FMT_POL_EXT": 1,
"FMT_SMF_EXT": 1,
"FMT_UNR_EXT": 1
}
},
"certification_process": {
"OutOfScope": {
"2 Protection Profile for Mobile Device Management Validation Report, 24 June 2016 servers, are out of scope. The MDMAEP exists as an extended package (EP) of both the Protection Profile for Mobile Device": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 6
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Aerospace Corporation",
"/Company": "The Aerospace Corporation",
"/CreationDate": "D:20160715130428-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 for Word",
"/ModDate": "D:20160715130429-04\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20160715170410",
"pdf_file_size_bytes": 137280,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 10
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b97a556b0db898d0332d85ca89bf71cae1355d4a56f63c9b5e25d7728a66fbc7",
"txt_hash": "d77a49a933c31b1c634c2fceb47b5cf882c00279f9bec0d454fb89996b2a5651"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "89e4aec724f488d023df38ae2b71841531060fd16658eba5213b6b7705fe6233",
"txt_hash": "c8610c49b42ddb2b40883764538159f482039a7f6bfc849037600111142d0b31"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Mobility",
"is_collaborative": false,
"maintenances": [],
"name": "Extended Package for Mobile Device Management Agents, Version 2.0",
"not_valid_after": "2017-05-21",
"not_valid_before": "2014-12-31",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_mdm_agent_v2.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_mdm_agent_v2.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "archived",
"version": "2.0"
}
}