This page was not yet optimized for use on mobile devices.
collaborative Protection Profile for Full Drive Encryption - Encryption Engine v2.0 + Errata 20190201
Web information ?
Status: activeCertification date: 2019-02-01
Scheme: ❌
Category: Data Protection
Security level: None
Certification report ?
Extracted keywords
Symmetric Algorithms
AESRandomness
RBGTrusted Execution Environments
SSCClaims
T.UNAUTHORIZED_DATA, T.KEYING_MATERIAL_COMPROMISE, T.AUTHORIZATION_GUESSING, T.KEYSPACE_EXHAUST, T.KNOWN_PLAINTEXT, T.CHOSEN_PLAINTEXT, T.UNAUTHORIZED_UPDATE, T.UNAUTHORIZED_FIRMWARE_UPDATE, T.UNAUTHORIZED_FIRMWARE_MODIFY, A.TRUSTED_CHANNEL, A.INITIAL_DRIVE_STATE, A.TRAINED_USER, A.PLATFORM_STATE, A.POWER_DOWN, A.STRONG_CRYPTO, A.PHYSICAL, OE.TRUSTED_CHANNEL, OE.INITIAL_DRIVE_STATE, OE.PASSPHRASE_STRENGTH, OE.POWER_DOWN, OE.SINGLE_USE_ET, OE.TRAINED_USERS, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SPD.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.4, FCS_CKM_EXT, FCS_KYC_EXT, FCS_SNI_EXT, FCS_VAL_EXT, FCS_COP.1, FCS_KDF_EXT, FCS_RBG_EXT, FCS_SMC_EXT, FDP_DSK_EXT, FMT_SMF, FPT_KYP_EXT, FPT_PWR_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_FAC_EXT, FPT_RBP_EXT, FPT_FUA_EXTEvaluation facilities
Gossamer Security, LeidosFile metadata
Creation date | D:20190506161100-04'00' |
---|---|
Modification date | D:20190506161100-04'00' |
Pages | 15 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-256, HMAC, HMAC-SHA-384, HMAC-SHA-512, CMACAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-256, SHA-384, SHA-512Randomness
DRBG, RNG, RBGElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, GCM, CCM, XEX, XTSClaims
T.UNAUTHORIZED_DATA_ACCESS, T.KEYING_MATERIAL_COMPROMISE, T.AUTHORIZATION_GUESSING, T.KEYSPACE_EXHAUST, T.KNOWN_PLAINTEXT, T.CHOSEN_PLAINTEXT, T.UNAUTHORIZED_UPDATE, T.UNAUTHORIZED_FIRMWARE_UPDATE, T.UNAUTHORIZED_FIRMWARE_MODIFY, A.TRUSTED_CHANNEL, A.INITIAL_DRIVE_STATE, A.TRAINED_USER, A.PLATFORM_STATE, A.POWER_DOWN, A.STRONG_CRYPTO, A.PHYSICAL, OE.TRUSTED_CHANNEL, OE.INITIAL_DRIVE_STATE, OE.PASSPHRASE_STRENGTH, OE.SINGLE_USE_ET, OE.TRAINED_USERS, OE.PLATFORM_STATE, OE.POWER_DOWN, OE.STRONG_ENVIRONMENT_CRYPTO, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, ATE_IND, AVA_VAN, AVA_VAN.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1, APE_SPD.1, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.4, FCS_CKM_EXT.6, FCS_KYC_EXT.2, FCS_SNI_EXT.1, FCS_VAL_EXT.1, FCS_COP.1, FCS_KDF_EXT.1, FCS_RBG_EXT.1, FCS_SMC_EXT.1, FCS_CKM_EXT, FCS_KDF_EXT, FCS_KYC_EXT, FCS_RBG_EXT, FCS_SMC_EXT, FCS_SNI_EXT, FCS_VAL_EXT, FCS_CKM.1.1, FCS_CKM.4.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.6.1, FCS_KYC_EXT.2.1, FCS_KYC_EXT.2.2, FCS_SNI_EXT.1.1, FCS_SNI_EXT.1.2, FCS_SNI_EXT.1.3, FCS_VAL_EXT.1.1, FCS_VAL_EXT.1.2, FCS_VAL_EXT.1.3, FCS_COP, FCS_CKM, FCS_COP.1.1, FCS_KDF_EXT.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SMC_EXT.1.1, FCS_KYC_EXT.1, FCS_KYC_EXT.1.1, FCS_KYC_EXT.1.2, FDP_DSK_EXT.1, FDP_DSK_EXT, FDP_DSK_EXT.1.1, FDP_DSK_EXT.1.2, FMT_SMF.1, FMT_SMF.1.1, FPT_KYP_EXT.1, FPT_PWR_EXT.1, FPT_PWR_EXT.2, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_FAC_EXT.1, FPT_RBP_EXT.1, FPT_FUA_EXT.1, FPT_FAC_EXT, FPT_FUA_EXT, FPT_KYP_EXT, FPT_PWR_EXT, FPT_RBP_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_KYP_EXT.1.1, FPT_PWR_EXT.1.1, FPT_PWR_EXT.2.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_FAC_EXT.1.1, FPT_RBP_EXT.1.1, FPT_RBP_EXT.1.2, FPT_FUA_EXT.1.1, FPT_FUA_EXT.1.2, FPT_FUA_EXT.1.3, FPT_FUA_EXT.1.4Standards
FIPS PUB 186-4, FIPS 186-4, NIST SP 800-90, NIST SP 800-38B, SP 800-38B, NIST SP 800-38F, NIST SP 800-56B, NIST SP 800-108, NIST SP 800-132, NIST SP 800-90A, PKCS #1, ISO/IEC 19772, ISO/IEC 26, ISO/IEC 14888-3, ISO/IEC 10118, ISO/IEC 18033-3, ISO/IEC 30, ISO/IEC 7, ISO/IEC 10116, ISO/IEC 18031:2011, ISO/IEC 18031:2011 23, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Creation date | D:20190221151852-05'00' |
---|---|
Modification date | D:20190221151852-05'00' |
Pages | 75 |
References ?
- ASURRE-Stor(TM) Solid State Self-Encrypting Drive Hardware revision 3.0, Firmware revision 1.5.1 archived
- Apple FileVault 2 on T2 systems running macOS Catalina 10.15 archived
- Apple macOS 13 Ventura: FileVault active
- CNS4 Hardware Encryption Layer vA1 archived
- CNS4 Software Encryption Layer vA1 archived
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Hardware Encryption Layer version 5.1 archived
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Hardware Encryption Layer version 5.4 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Plus Hardware Encryption Layer version 1.1.0 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Plus Software Encryption Layer v1.01.00 active
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Software Encryption Layer v3.0.1 archived
- Curtiss-Wright Defense Solutions Data Transport System 1-Slot Software Encryption Layer v3.01.00 active
- Curtiss-Wright Defense Solutions HSR10 CSfC Software Encryption Layer v1.1.0 active
- Curtiss-Wright Defense Solutions XMC NVMe Encryptor version 1.0.0 active
- DIGISTOR TCG OPAL SSC FIPS SSD Series, firmware version SCPG13.0/ECPG13.0/ECPM13.1 active
- DTS1 Hardware Encryption Layer v1.0 archived
- DTS1 Software Encryption Layer v1.0 archived
- Galleon Embedded Computing XSR and G1 Hardware Encryption Layer active
- Galleon Embedded Computing XSR and G1 Software Encryption Layer active
- KLC Advantech Drives, Firmware Version: SCPB13.0/ECPB13.0 active
- KLC Group LLC CipherDriveOne Kryptr 1.1.0 active
- L3Harris Common Data Loader Version 02.01 active
- NetApp Volume Encryption (NVE) Appliances running ONTAP 9.14.1 active
- NetApp Volume Encryption (NVE) Appliances running ONTAP 9.7P13 archived
- SSD Drives, Firmware Versions: SCPU13.0/ECPU13.0/SCQU15.0/ECQU15.0 active
- Scalar and Express P-series SSD, version NV.R1900 active
- Seagate Secure® TCG Opal and Enterprise SSC Self-Encrypting Drives archived
- Seagate Secure® TCG SSC Self-Encrypting Drives archived
- Seagate® BarraCuda™ 515 SSD, Firmware version ECPM13.1 archived
- Seagate® Secure NVMe Self-Encrypting Drives active
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name collaborative Protection Profile for Full Drive Encryption - Encryption Engine v2.0 + Errata 20190201 was processed.
Raw data
{
"_id": "9b51621665ff7223",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "9b51621665ff7223",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "CPP_FDE_EE_V2.0E.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 10
},
"ECDSA": {
"ECDSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.INITIAL_DRIVE_STATE": 1,
"A.PHYSICAL": 1,
"A.PLATFORM_STATE": 2,
"A.POWER_DOWN": 1,
"A.STRONG_CRYPTO": 2,
"A.TRAINED_USER": 4,
"A.TRUSTED_CHANNEL": 2
},
"OE": {
"OE.INITIAL_DRIVE_STATE": 2,
"OE.PASSPHRASE_STRENGTH": 2,
"OE.PHYSICAL": 2,
"OE.PLATFORM_STATE": 2,
"OE.POWER_DOWN": 2,
"OE.SINGLE_USE_ET": 2,
"OE.STRONG_ENVIRONMENT_CRYPTO": 3,
"OE.TRAINED_USERS": 2,
"OE.TRUSTED_CHANNEL": 2
},
"T": {
"T.AUTHORIZATION_GUESSING": 1,
"T.CHOSEN_PLAINTEXT": 1,
"T.KEYING_MATERIAL_COMPROMISE": 1,
"T.KEYSPACE_EXHAUST": 1,
"T.KNOWN_PLAINTEXT": 1,
"T.UNAUTHORIZED_DATA_ACCESS": 2,
"T.UNAUTHORIZED_FIRMWARE_MODIFY": 1,
"T.UNAUTHORIZED_FIRMWARE_UPDATE": 1,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 4
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.1": 4,
"ALC_CMS.1": 4
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_IND": 1,
"ATE_IND.1": 3
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 3
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 29,
"FCS_CKM.1.1": 3,
"FCS_CKM.4": 22,
"FCS_CKM.4.1": 5,
"FCS_CKM_EXT": 4,
"FCS_CKM_EXT.4": 16,
"FCS_CKM_EXT.4.1": 3,
"FCS_CKM_EXT.6": 7,
"FCS_CKM_EXT.6.1": 2,
"FCS_COP": 2,
"FCS_COP.1": 128,
"FCS_COP.1.1": 7,
"FCS_KDF_EXT": 4,
"FCS_KDF_EXT.1": 12,
"FCS_KDF_EXT.1.1": 2,
"FCS_KYC_EXT": 5,
"FCS_KYC_EXT.1": 6,
"FCS_KYC_EXT.1.1": 1,
"FCS_KYC_EXT.1.2": 1,
"FCS_KYC_EXT.2": 18,
"FCS_KYC_EXT.2.1": 2,
"FCS_KYC_EXT.2.2": 2,
"FCS_RBG_EXT": 7,
"FCS_RBG_EXT.1": 20,
"FCS_RBG_EXT.1.1": 3,
"FCS_RBG_EXT.1.2": 4,
"FCS_SMC_EXT": 4,
"FCS_SMC_EXT.1": 17,
"FCS_SMC_EXT.1.1": 2,
"FCS_SNI_EXT": 4,
"FCS_SNI_EXT.1": 17,
"FCS_SNI_EXT.1.1": 2,
"FCS_SNI_EXT.1.2": 2,
"FCS_SNI_EXT.1.3": 3,
"FCS_VAL_EXT": 4,
"FCS_VAL_EXT.1": 16,
"FCS_VAL_EXT.1.1": 2,
"FCS_VAL_EXT.1.2": 2,
"FCS_VAL_EXT.1.3": 2
},
"FDP": {
"FDP_DSK_EXT": 4,
"FDP_DSK_EXT.1": 11,
"FDP_DSK_EXT.1.1": 2,
"FDP_DSK_EXT.1.2": 2
},
"FMT": {
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1
},
"FPT": {
"FPT_FAC_EXT": 4,
"FPT_FAC_EXT.1": 8,
"FPT_FAC_EXT.1.1": 2,
"FPT_FUA_EXT": 5,
"FPT_FUA_EXT.1": 13,
"FPT_FUA_EXT.1.1": 2,
"FPT_FUA_EXT.1.2": 2,
"FPT_FUA_EXT.1.3": 2,
"FPT_FUA_EXT.1.4": 2,
"FPT_KYP_EXT": 4,
"FPT_KYP_EXT.1": 11,
"FPT_KYP_EXT.1.1": 2,
"FPT_PWR_EXT": 4,
"FPT_PWR_EXT.1": 14,
"FPT_PWR_EXT.1.1": 4,
"FPT_PWR_EXT.2": 11,
"FPT_PWR_EXT.2.1": 2,
"FPT_RBP_EXT": 4,
"FPT_RBP_EXT.1": 6,
"FPT_RBP_EXT.1.1": 3,
"FPT_RBP_EXT.1.2": 2,
"FPT_TST_EXT": 4,
"FPT_TST_EXT.1": 11,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT": 5,
"FPT_TUD_EXT.1": 14,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 4,
"FPT_TUD_EXT.1.3": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CCM": {
"CCM": 2
},
"GCM": {
"GCM": 9
},
"XEX": {
"XEX": 1
},
"XTS": {
"XTS": 6
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 8,
"P-384": 8,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 9,
"SHA-384": 7,
"SHA-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 10
},
"RNG": {
"RBG": 20,
"RNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 186-4": 1,
"FIPS PUB 186-4": 5
},
"ISO": {
"ISO/IEC 10116": 2,
"ISO/IEC 10118": 2,
"ISO/IEC 14888-3": 1,
"ISO/IEC 18031:2011": 6,
"ISO/IEC 18031:2011 23": 1,
"ISO/IEC 18033-3": 1,
"ISO/IEC 19772": 6,
"ISO/IEC 26": 2,
"ISO/IEC 30": 2,
"ISO/IEC 7": 2
},
"NIST": {
"NIST SP 800-108": 2,
"NIST SP 800-132": 2,
"NIST SP 800-38B": 1,
"NIST SP 800-38F": 1,
"NIST SP 800-56B": 1,
"NIST SP 800-90": 2,
"NIST SP 800-90A": 1,
"SP 800-38B": 1
},
"PKCS": {
"PKCS #1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 23,
"AES-128": 2,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 3,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20190221151852-05\u002700\u0027",
"/ModDate": "D:20190221151852-05\u002700\u0027",
"pdf_file_size_bytes": 1453293,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 75
},
"report_filename": "cpp_fde_ee_v2.0E-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.INITIAL_DRIVE_STATE": 1,
"A.PHYSICAL": 1,
"A.PLATFORM_STATE": 1,
"A.POWER_DOWN": 1,
"A.STRONG_CRYPTO": 1,
"A.TRAINED_USER": 1,
"A.TRUSTED_CHANNEL": 1
},
"OE": {
"OE.INITIAL_DRIVE_STATE": 1,
"OE.PASSPHRASE_STRENGTH": 1,
"OE.PHYSICAL": 1,
"OE.POWER_DOWN": 1,
"OE.SINGLE_USE_ET": 1,
"OE.TRAINED_USERS": 1,
"OE.TRUSTED_CHANNEL": 1
},
"T": {
"T.AUTHORIZATION_GUESSING": 1,
"T.CHOSEN_PLAINTEXT": 1,
"T.KEYING_MATERIAL_COMPROMISE": 1,
"T.KEYSPACE_EXHAUST": 1,
"T.KNOWN_PLAINTEXT": 1,
"T.UNAUTHORIZED_DATA": 1,
"T.UNAUTHORIZED_FIRMWARE_MODIFY": 1,
"T.UNAUTHORIZED_FIRMWARE_UPDATE": 1,
"T.UNAUTHORIZED_UPDATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ": 1,
"APE_REQ.1": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 3,
"FCS_CKM.4": 5,
"FCS_CKM_EXT": 1,
"FCS_CKM_EXT.4": 2,
"FCS_COP.1": 7,
"FCS_KDF_EXT": 1,
"FCS_KYC_EXT": 1,
"FCS_RBG_EXT": 1,
"FCS_SMC_EXT": 1,
"FCS_SNI_EXT": 1,
"FCS_VAL_EXT": 1
},
"FDP": {
"FDP_DSK_EXT": 1
},
"FMT": {
"FMT_SMF": 1
},
"FPT": {
"FPT_FAC_EXT": 1,
"FPT_FUA_EXT": 1,
"FPT_KYP_EXT": 1,
"FPT_PWR_EXT": 2,
"FPT_RBP_EXT": 1,
"FPT_TST_EXT": 1,
"FPT_TUD_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 4
},
"Leidos": {
"Leidos": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 1
}
},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 55
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20190506161100-04\u002700\u0027",
"/ModDate": "D:20190506161100-04\u002700\u0027",
"pdf_file_size_bytes": 925320,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "31a4ba2ee276672933a7a100e4eb871431ed5049f2709abc2f3accd3a3b55e4f",
"txt_hash": "b182da81255e351aa18c3b0e4876bf268c7d29e1861f591d88532a4fd41725c6"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0c3d0dfaf55113abdc67d78828791b18178ab378594e98bb51802d32b7c11b4e",
"txt_hash": "9ac4b032a778ed76e8a283e57930933b6ca2e2b926251937497d2e62304f10c3"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Data Protection",
"is_collaborative": true,
"maintenances": [],
"name": "collaborative Protection Profile for Full Drive Encryption - Encryption Engine v2.0 + Errata 20190201",
"not_valid_after": null,
"not_valid_before": "2019-02-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_EE_V2.0E.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/cpp_fde_ee_v2.0E-vr.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "active",
"version": "2.0E"
}
}