Extended Package for Email Clients v2.0

Web information

Status active
Valid from 18.06.2015
Scheme 🇺🇸 US
Category Other Devices and Systems
Security level EAL1

Certification report

Extracted keywords

Vendor
Microsoft

Claims
O.ADDON_INTEGRITY, T.FLAWED_ADDON
Security Assurance Requirements (SAR)
ACE_REQ, ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.1, ACE_ECD.1, ACE_REQ.1, ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ALC_TSU_EXT.1, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FCS_CKM_EXT.3, FCS_CKM_EXT.4, FCS_IVG_EXT.1, FCS_KYC_EXT.1, FCS_CKM_EXT.5, FCS_NOG_EXT.1, FCS_SAG_EXT.1, FCS_COP_EXT.2, FCS_SMC_EXT.1, FDP_NOT_EXT.1, FDP_NOT_EXT.2, FDP_PST_EXT.1, FDP_REN_EXT.1, FIA_SASL_EXT.1, FMT_MOF_EXT.1, FPT_AON_EXT.1, FPT_AON_EXT.2, FTP_ITC_EXT.1
Evaluation facilities
Booz Allen Hamilton

File metadata

Creation date D:20190913074644-04'00'
Modification date D:20190913074843-04'00'
Pages 14

Protection Profile

protection profile file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Symmetric Algorithms
AES, HMAC
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA1, SHA256, PBKDF
Protocols
TLS
Randomness
DRBG, RNG, RBG
Block cipher modes
CBC, GCM, XTS

Vendor
Microsoft

Claims
O.MANAGEMENT, O.PROTECTED_STORAGE, O.PROTECTED_COMMS, O.ADDON_INTEGRITY
Security Functional Requirements (SFR)
FCS_CKM.2.1, FCS_COP.1.1, FCS_RBG_EXT.2, FCS_TLSC_EXT.1, FCS_CKM_EXT.3, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_COP_EXT.2, FCS_IVG_EXT.1, FCS_KYC_EXT.1, FCS_NOG_EXT.1, FCS_SAG_EXT.1, FCS_SMC_EXT.1, FCS_CKM, FCS_CKM_EXT.3.1, FCS_CKM_EXT.4.1, FCS_RBG_EXT.1, FCS_KYC_EXT.1.1, FCS_CKM_EXT.5.1, FCS_IVG_EXT.1.1, FCS_SAG_EXT.1.1, FCS_NOG_EXT.1.1, FCS_COP_EXT.2.1, FCS_SMC_EXT.1.1, FDP_NOT_EXT.1, FDP_NOT_EXT.2, FDP_NOT_EXT.1.1, FDP_NOT_EXT.2.1, FDP_PST_EXT.1.1, FDP_REN_EXT.1, FDP_REN_EXT.1.1, FIA_SASL_EXT.1, FIA_SASL_EXT.1.2, FIA_SASL_EXT.1.1, FIA_SASL_EXT.1.3, FIA_SASL_EXT.1.4, FMT_MOF_EXT.1, FMT_MOF_EXT.1.1, FMT_MOF, FPT_AON_EXT.1, FPT_AON_EXT.2, FPT_AON_EXT.1.1, FPT_AON_EXT.2.1, FPT_AON_EXT.2.2, FPT_AON_EXT.2.3, FTP_ITC_EXT.1, FTP_ITC_EXT.1.1, FTP_ITC_EXT.1.2, FTP_DIT_EXT.1

Standards
RFC 3501, RFC 1939, RFC 5321, RFC 5751, RFC 3565, RFC 5280, RFC 4422, RFC 5034, RFC 4959, RFC 4954, X.509

References

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Updates Feed

  • The protection profile data changed.
  • The protection profile data changed.
  • The protection profile was first processed.

Raw data

{
  "_id": "b88fc56240893238",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "b88fc56240893238",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "pp_app_emailclient_ep_v2.0.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 5
          },
          "ECDSA": {
            "ECDSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.ADDON_INTEGRITY": 1,
          "O.MANAGEMENT": 1,
          "O.PROTECTED_COMMS": 1,
          "O.PROTECTED_STORAGE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.2.1": 1,
          "FCS_CKM_EXT.3": 2,
          "FCS_CKM_EXT.3.1": 3,
          "FCS_CKM_EXT.4": 1,
          "FCS_CKM_EXT.4.1": 1,
          "FCS_CKM_EXT.5": 2,
          "FCS_CKM_EXT.5.1": 2,
          "FCS_COP.1.1": 2,
          "FCS_COP_EXT.2": 9,
          "FCS_COP_EXT.2.1": 1,
          "FCS_IVG_EXT.1": 2,
          "FCS_IVG_EXT.1.1": 2,
          "FCS_KYC_EXT.1": 3,
          "FCS_KYC_EXT.1.1": 3,
          "FCS_NOG_EXT.1": 2,
          "FCS_NOG_EXT.1.1": 1,
          "FCS_RBG_EXT.1": 3,
          "FCS_RBG_EXT.2": 1,
          "FCS_SAG_EXT.1": 2,
          "FCS_SAG_EXT.1.1": 1,
          "FCS_SMC_EXT.1": 4,
          "FCS_SMC_EXT.1.1": 1,
          "FCS_TLSC_EXT.1": 1
        },
        "FDP": {
          "FDP_NOT_EXT.1": 4,
          "FDP_NOT_EXT.1.1": 1,
          "FDP_NOT_EXT.2": 2,
          "FDP_NOT_EXT.2.1": 1,
          "FDP_PST_EXT.1.1": 1,
          "FDP_REN_EXT.1": 1,
          "FDP_REN_EXT.1.1": 3
        },
        "FIA": {
          "FIA_SASL_EXT.1": 3,
          "FIA_SASL_EXT.1.1": 1,
          "FIA_SASL_EXT.1.2": 2,
          "FIA_SASL_EXT.1.3": 1,
          "FIA_SASL_EXT.1.4": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF_EXT.1": 3,
          "FMT_MOF_EXT.1.1": 4
        },
        "FPT": {
          "FPT_AON_EXT.1": 2,
          "FPT_AON_EXT.1.1": 4,
          "FPT_AON_EXT.2": 3,
          "FPT_AON_EXT.2.1": 2,
          "FPT_AON_EXT.2.2": 1,
          "FPT_AON_EXT.2.3": 1
        },
        "FTP": {
          "FTP_DIT_EXT.1": 1,
          "FTP_ITC_EXT.1": 2,
          "FTP_ITC_EXT.1.1": 1,
          "FTP_ITC_EXT.1.2": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "GCM": {
          "GCM": 2
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "PBKDF": {
          "PBKDF": 1
        },
        "SHA": {
          "SHA1": {
            "SHA1": 1
          },
          "SHA2": {
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 3
        },
        "RNG": {
          "RBG": 6,
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "RFC": {
          "RFC 1939": 1,
          "RFC 3501": 1,
          "RFC 3565": 1,
          "RFC 4422": 2,
          "RFC 4954": 1,
          "RFC 4959": 1,
          "RFC 5034": 1,
          "RFC 5280": 2,
          "RFC 5321": 1,
          "RFC 5751": 2
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 4
        }
      },
      "vulnerability": {}
    },
    "pp_metadata": null,
    "report_filename": "emailclient_ep_v2.0-vr.pdf",
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.ADDON_INTEGRITY": 1
        },
        "T": {
          "T.FLAWED_ADDON": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACE": {
          "ACE_CCL.1": 1,
          "ACE_ECD.1": 1,
          "ACE_INT.1": 1,
          "ACE_OBJ.1": 1,
          "ACE_REQ": 1,
          "ACE_REQ.1": 1,
          "ACE_SPD.1": 1
        },
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_TSU_EXT.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FCS": {
          "FCS_CKM_EXT.3": 1,
          "FCS_CKM_EXT.4": 1,
          "FCS_CKM_EXT.5": 1,
          "FCS_COP_EXT.2": 1,
          "FCS_IVG_EXT.1": 1,
          "FCS_KYC_EXT.1": 1,
          "FCS_NOG_EXT.1": 1,
          "FCS_SAG_EXT.1": 1,
          "FCS_SMC_EXT.1": 1
        },
        "FDP": {
          "FDP_NOT_EXT.1": 1,
          "FDP_NOT_EXT.2": 1,
          "FDP_PST_EXT.1": 1,
          "FDP_REN_EXT.1": 1
        },
        "FIA": {
          "FIA_SASL_EXT.1": 1
        },
        "FMT": {
          "FMT_MOF_EXT.1": 1
        },
        "FPT": {
          "FPT_AON_EXT.1": 1,
          "FPT_AON_EXT.2": 1
        },
        "FTP": {
          "FTP_ITC_EXT.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BoozAllenHamilton": {
          "Booz Allen Hamilton": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20190913074644-04\u002700\u0027",
      "/ModDate": "D:20190913074843-04\u002700\u0027",
      "pdf_file_size_bytes": 607610,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    }
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "pdf_hash": "a6289a51258506215e666f15eed83317faec4214a18b275bd27b74d385af3d87",
      "txt_hash": "559e0dd62b198cca8e463a0b752c81b82c5e9b66a880b3db125c42963b83d90a"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "cb061a95915da0f7df7909222147a2eee8843e380f2d130b0122c55166683cac",
      "txt_hash": "c0c367bdabfd8f7256db0150aa4a70c377f5e8a1e0a5941b24a7e99b3cd4978c"
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "Other Devices and Systems",
    "is_collaborative": false,
    "maintenances": [],
    "name": "Extended Package for Email Clients v2.0",
    "not_valid_after": null,
    "not_valid_before": "2015-06-18",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_emailclient_ep_v2.0.pdf",
    "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/emailclient_ep_v2.0-vr.pdf",
    "scheme": "US",
    "security_level": {
      "_type": "Set",
      "elements": [
        "EAL1"
      ]
    },
    "status": "active",
    "version": "2.0"
  }
}