This page was not yet optimized for use on mobile devices.
Protection Profile for Single-level Operating Systems in Environments Requiring Medium Robustness, Version 1.22
Web information
Status: archivedCertification date: 2001-05-23
Archived date: 2007-09-16
Scheme: 🇺🇸
Category: Operating Systems
Security level: EAL4+
Certification report
Extracted keywords
Security level
EAL4Claims
T.ADMIN_ERROR, T.ADMIN_ROGUE, T.AUDIT_CORRUPT, T.CONFIG_CORRUPT, T.DOS, T.EAVESDROP, T.IMPROPER_INSTALLATION, T.INSECURE_START, T.MASQUERADE, T.OBJECTS_NOT_CLEAN, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.POOR_TEST, T.REPLAY, T.SPOOFING, T.SYSACC, T.UNATTENDED_SESSION, T.UNAUTH_ACCESS, T.UNAUTH_MODIFICATION, T.UNDETECTED_ACTIONS, T.UNIDENTIFIED_ACTIONS, T.UNKNOWN_STATE, T.USER_CORRUPT, A.PHYSICALCertificates
CCEVS-VR-01-0002File metadata
Title | Section 1 |
---|---|
Author | Simpson |
Creation date | D:20021129135454-05'00' |
Modification date | D:20021129135529-05'00' |
Pages | 12 |
Creator | Acrobat PDFMaker 5.0 for Word |
Producer | Acrobat Distiller 5.0.5 (Windows) |
Profile
Extracted keywords
Symmetric Algorithms
AES, DES, TDEA, HMACAsymmetric Algorithms
ECDSA, Diffie-Hellman, DSAHash functions
SHA-1Schemes
Key Exchange, Key AgreementProtocols
VPNRandomness
PRNG, RNGSecurity level
EAL 4, EAL4, EAL4+, EAL1, EAL3, EAL5, EAL7Claims
O.ACCESS, O.ACCESS_HISTORY, O.ADMIN_ROLE, O.ADMIN_TRAINED, O.AUDIT_GENERATION, O.CONFIG_MGMT, O.DISCRETIONARY_ACCESS, O.DISCRETIONARY_USER_CONTROL, O.DISPLAY_BANNERS, O.ENCRYPTED_CHANNEL, O.ENCRYPTION_SERVICES, O.INSTALL, O.MANAGE, O.PENETRATION_TEST, O.PROTECT, O.RECOVERY, O.RESIDUAL_INFORMATION, O.RESOURCE_SHARING, O.SELF_PROTECTION, O.SOUND_DESIGN, O.SOUND_IMPLEMENTATION, O.TESTING, O.TRAINED_USERS, O.TRUSTED_PATH, O.TRUSTED_SYSTEM_OPERATION, O.TSF_CRYPTOGRAPHIC_INTEGRITY, O.USER_AUTHENTICATION, O.USER_IDENTIFICATION, O.VULNERABILITY_ANALYSIS, O.AUDIT_PROTECTION, O.AUDIT_REVIEW, O.SOUND_, O.DISPLAY_BANNER, O.DISCRETIONARY_, T.ADMIN_ERROR, T.ADMIN_ROGUE, T.AUDIT_CORRUPT, T.CONFIG_CORRUPT, T.DOS, T.EAVESDROP, T.IMPROPER_INSTALLATION, T.INSECURE_START, T.MASQUERADE, T.OBJECTS_NOT_CLEAN, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.POOR_TEST, T.REPLAY, T.SPOOFING, T.SYSACC, T.UNATTENDED_SESSION, T.UNAUTH_ACCESS, T.UNAUTH_MODIFICATION, T.UNDETECTED_ACTIONS, T.UNIDENTIFIED_ACTIONS, T.UNKNOWN_STATE, T.USER_CORRUPT, T.UNDECTED_ACTIONS, A.PHYSICAL, OE.PHYSICALSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM, AGD_USR, AGD_ADM.1, AGD_USR.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_CCA_EXP, AVA_MSU, AVA_SOF, AVA_VLA, AVA_CCA_EXP.1, AVA_CCA_EXP.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.3, AVA_MSU.1Security Functional Requirements (SFR)
FAU_ARP, FAU_GEN, FAU_SAA, FAU_SAR, FAU_SEL, FAU_STG, FAU_STG.1.2, FAU_ARP.1, FAU_ARP.1.1, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.4, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.4.1, FCS_BCM_EXP, FCS_CKM, FCS_COP, FCS_CKM.2.1, FCS_CKM_EXP.2, FCS_BCM_EXP.1, FCS_CKM_EXP.1, FCS_COP_EXP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_BCM_EXP.1.1, FCS_BCM_EXP.1.2, FCS_CKM.1.1, FCS_CKM_EXP.1.1, FCS_CKM_EXP.1.2, FCS_COP.1.1, FCS_COP_EXP.1.1, FCS_COP_EXP.1.2, FCS_CKM.4.1, FCS_CKM_EXP.2.5, FCS_COP_EXP.2, FDP_ACC, FDP_ACF, FDP_ITT, FDP_RIP, FDP_IFF.1.4, FDP_ACC.2, FDP_ITT.1, FDP_RIP.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ITT.1.1, FDP_RIP.2.1, FDP_ACF.1.1, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_USB, FIA_UAU.1.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.7, FIA_UID.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1.1, FIA_UAU_EXP.1, FIA_USB.1.1, FMT_MOF, FMT_MSA, FMT_MTD, FMT_REV, FMT_SAE, FMT_SMR, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MSA_EXP.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_REV.1, FMT_SAE.1, FMT_SMR.1, FMT_SMR.3, FMT_REV.1.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA_EXP.1.1, FMT_REV.1.2, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR.3.1, FPT_AMT, FPT_ITT, FPT_RCV, FPT_RVM, FPT_SEP, FPT_STM, FPT_TDC, FPT_TRC, FPT_TST, FPT_ITT.3.1, FPT_ITT.2.1, FPT_TST.1.2, FPT_AMT.1, FPT_ITT.1, FPT_ITT.3, FPT_RCV.1, FPT_RVM.1, FPT_SEP.2, FPT_STM.1, FPT_TDC.1, FPT_TRC.1, FPT_TST.1, FPT_AMT.1.1, FPT_ITT.1.1, FPT_ITT.3.2, FPT_RCV.1.1, FPT_RVM.1.1, FPT_SEP.2.1, FPT_SEP.2.2, FPT_SEP.2.3, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TRC.1.1, FPT_TRC.1.2, FPT_TST.1.1, FPT_TST.1.3, FRU_RSA, FRU_RSA.1, FRU_RSA.1.1, FTA_SSL, FTA_TAB, FTA_TAH, FTA_SSL.1, FTA_SSL.2, FTA_TAB.1, FTA_TAH.1, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTA_TAB.1.1, FTA_TAH.1.1, FTA_TAH.1.2, FTA_TAH.1.3, FTP_TRP, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Standards
FIPS PUB 140-1, FIPS 140-1, FIPS PUB 180-1, FIPS PUB 186-2, FIPS PUB 17110, FIPS PUB 17113, FIPS PUB 46-3, FIPS PUB 17115, FIPS PUB 140, FIPS PUB 171, X.509File metadata
Title | Protection Profile For Single-level Operating Systems In Environments Requiring Medium Robustness |
---|---|
Subject | Single-level OS PP with DAC for Medium Robustness Environments |
Keywords | operating system, COTS, medium robustness, single-level, access control, discretionary access control, cryptography |
Author | Hugo A. Badillo |
Creation date | D:20010724063231 |
Modification date | D:20010727150822-04'00' |
Pages | 111 |
Creator | Microsoft Word 9.0 |
Producer | Acrobat Distiller 4.05 for Windows |
References
No references are available for this protection profile.
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 291744, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 12, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Simpson', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20021129135529-05'00'", '/Title': 'Section 1', '/CreationDate': "D:20021129135454-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 726027, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 111, '/Producer': 'Acrobat Distiller 4.05 for Windows', '/Creator': 'Microsoft Word 9.0', '/Keywords': 'operating system, COTS, medium robustness, single-level, access control, discretionary access control, cryptography', '/ModDate': "D:20010727150822-04'00'", '/Subject': 'Single-level OS PP with DAC for Medium Robustness Environments', '/CreationDate': 'D:20010724063231', '/Title': 'Protection Profile For Single-level Operating Systems In Environments Requiring Medium Robustness', '/Author': 'Hugo A. Badillo', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.iatf.net/protection_profiles/index.cfm', 'http://www.csrc.nist.gov/fips/fips46-3.pdf', 'http://www.itl.nist.gov/fipspubs/fip140-1.htm', 'http://csrc.nist.gov/fips/fips186-2.pdf', 'mailto:[email protected]', 'http://www.itl.nist.gov/fipspubs/fip180-1.htm', 'http://csrc.nist.gov/fips/fips171.txt', 'http://www.iatf.net/']}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-01-0002': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.ADMIN_ERROR': 1, 'T.ADMIN_ROGUE': 1, 'T.AUDIT_CORRUPT': 1, 'T.CONFIG_CORRUPT': 1, 'T.DOS': 1, 'T.EAVESDROP': 1, 'T.IMPROPER_INSTALLATION': 1, 'T.INSECURE_START': 1, 'T.MASQUERADE': 1, 'T.OBJECTS_NOT_CLEAN': 1, 'T.POOR_DESIGN': 1, 'T.POOR_IMPLEMENTATION': 1, 'T.POOR_TEST': 1, 'T.REPLAY': 1, 'T.SPOOFING': 1, 'T.SYSACC': 1, 'T.UNATTENDED_SESSION': 1, 'T.UNAUTH_ACCESS': 1, 'T.UNAUTH_MODIFICATION': 1, 'T.UNDETECTED_ACTIONS': 1, 'T.UNIDENTIFIED_ACTIONS': 1, 'T.UNKNOWN_STATE': 1, 'T.USER_CORRUPT': 1}, 'A': {'A.PHYSICAL': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 1, 'EAL4+': 2, 'EAL1': 1, 'EAL3': 1, 'EAL5': 1, 'EAL7': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 3, 'ACM_CAP': 3, 'ACM_SCP': 3, 'ACM_AUT.1': 9, 'ACM_CAP.4': 18, 'ACM_SCP.2': 6}, 'ADO': {'ADO_DEL': 3, 'ADO_IGS': 3, 'ADO_DEL.2': 14, 'ADO_IGS.1': 12}, 'ADV': {'ADV_FSP': 3, 'ADV_HLD': 3, 'ADV_IMP': 3, 'ADV_INT': 3, 'ADV_LLD': 3, 'ADV_RCR': 3, 'ADV_SPM': 3, 'ADV_FSP.2': 24, 'ADV_HLD.2': 28, 'ADV_IMP.2': 10, 'ADV_INT.1': 11, 'ADV_LLD.1': 27, 'ADV_RCR.1': 7, 'ADV_SPM.1': 23}, 'AGD': {'AGD_ADM': 3, 'AGD_USR': 3, 'AGD_ADM.1': 16, 'AGD_USR.1': 10}, 'ALC': {'ALC_DVS': 3, 'ALC_FLR': 3, 'ALC_LCD': 2, 'ALC_TAT': 3, 'ALC_DVS.1': 11, 'ALC_FLR.2': 15, 'ALC_LCD.1': 11, 'ALC_TAT.1': 12}, 'ATE': {'ATE_COV': 3, 'ATE_DPT': 3, 'ATE_FUN': 3, 'ATE_IND': 3, 'ATE_COV.2': 6, 'ATE_DPT.2': 7, 'ATE_FUN.1': 12, 'ATE_IND.2': 12, 'ATE_COV.1': 2}, 'AVA': {'AVA_CCA_EXP': 3, 'AVA_MSU': 3, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_CCA_EXP.1': 11, 'AVA_CCA_EXP.2': 11, 'AVA_MSU.2': 11, 'AVA_SOF.1': 13, 'AVA_VLA.3': 18, 'AVA_MSU.1': 8}}, 'cc_sfr': {'FAU': {'FAU_ARP': 2, 'FAU_GEN': 2, 'FAU_SAA': 2, 'FAU_SAR': 2, 'FAU_SEL': 2, 'FAU_STG': 2, 'FAU_STG.1.2': 2, 'FAU_ARP.1': 8, 'FAU_ARP.1.1': 3, 'FAU_GEN.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 4, 'FAU_SAA.1': 6, 'FAU_SAR.1': 6, 'FAU_SAR.2': 6, 'FAU_SAR.3': 5, 'FAU_SEL.1': 6, 'FAU_STG.1': 6, 'FAU_STG.4': 4, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 3, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 2, 'FAU_STG.1.1': 1, 'FAU_STG.4.1': 3}, 'FCS': {'FCS_BCM_EXP': 2, 'FCS_CKM': 2, 'FCS_COP': 2, 'FCS_CKM.2.1': 2, 'FCS_CKM_EXP.2': 21, 'FCS_BCM_EXP.1': 7, 'FCS_CKM_EXP.1': 14, 'FCS_COP_EXP.1': 16, 'FCS_CKM.1': 16, 'FCS_CKM.2': 6, 'FCS_CKM.4': 8, 'FCS_COP.1': 40, 'FCS_BCM_EXP.1.1': 1, 'FCS_BCM_EXP.1.2': 1, 'FCS_CKM.1.1': 7, 'FCS_CKM_EXP.1.1': 1, 'FCS_CKM_EXP.1.2': 1, 'FCS_COP.1.1': 12, 'FCS_COP_EXP.1.1': 1, 'FCS_COP_EXP.1.2': 1, 'FCS_CKM.4.1': 2, 'FCS_CKM_EXP.2.5': 1, 'FCS_COP_EXP.2': 4}, 'FDP': {'FDP_ACC': 2, 'FDP_ACF': 3, 'FDP_ITT': 2, 'FDP_RIP': 2, 'FDP_IFF.1.4': 1, 'FDP_ACC.2': 6, 'FDP_ITT.1': 6, 'FDP_RIP.2': 8, 'FDP_ACC.2.1': 4, 'FDP_ACC.2.2': 3, 'FDP_ITT.1.1': 1, 'FDP_RIP.2.1': 1, 'FDP_ACF.1.1': 1}, 'FIA': {'FIA_AFL': 3, 'FIA_ATD': 2, 'FIA_SOS': 2, 'FIA_UAU': 2, 'FIA_UID': 2, 'FIA_USB': 2, 'FIA_UAU.1.1': 2, 'FIA_ATD.1': 6, 'FIA_SOS.1': 7, 'FIA_UAU.1': 12, 'FIA_UAU.7': 6, 'FIA_UID.1': 14, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_UAU_EXP.1': 2, 'FIA_USB.1.1': 1}, 'FMT': {'FMT_MOF': 2, 'FMT_MSA': 2, 'FMT_MTD': 2, 'FMT_REV': 2, 'FMT_SAE': 2, 'FMT_SMR': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1': 98, 'FMT_MTD.1.1': 9, 'FMT_MSA_EXP.1': 13, 'FMT_MOF.1': 15, 'FMT_MSA.1': 10, 'FMT_MSA.2': 8, 'FMT_MSA.3': 8, 'FMT_REV.1': 20, 'FMT_SAE.1': 12, 'FMT_SMR.1': 10, 'FMT_SMR.3': 6, 'FMT_REV.1.1': 5, 'FMT_MOF.1.1': 2, 'FMT_MSA.1.1': 3, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA_EXP.1.1': 1, 'FMT_REV.1.2': 2, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMR.3.1': 1}, 'FPT': {'FPT_AMT': 2, 'FPT_ITT': 2, 'FPT_RCV': 2, 'FPT_RVM': 2, 'FPT_SEP': 2, 'FPT_STM': 2, 'FPT_TDC': 2, 'FPT_TRC': 2, 'FPT_TST': 2, 'FPT_ITT.3.1': 2, 'FPT_ITT.2.1': 1, 'FPT_TST.1.2': 12, 'FPT_AMT.1': 6, 'FPT_ITT.1': 8, 'FPT_ITT.3': 8, 'FPT_RCV.1': 10, 'FPT_RVM.1': 10, 'FPT_SEP.2': 6, 'FPT_STM.1': 12, 'FPT_TDC.1': 8, 'FPT_TRC.1': 8, 'FPT_TST.1': 44, 'FPT_AMT.1.1': 1, 'FPT_ITT.1.1': 1, 'FPT_ITT.3.2': 1, 'FPT_RCV.1.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.2.1': 1, 'FPT_SEP.2.2': 1, 'FPT_SEP.2.3': 3, 'FPT_STM.1.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_TST.1.1': 7, 'FPT_TST.1.3': 9}, 'FRU': {'FRU_RSA': 2, 'FRU_RSA.1': 8, 'FRU_RSA.1.1': 2}, 'FTA': {'FTA_SSL': 2, 'FTA_TAB': 2, 'FTA_TAH': 2, 'FTA_SSL.1': 10, 'FTA_SSL.2': 10, 'FTA_TAB.1': 6, 'FTA_TAH.1': 6, 'FTA_SSL.1.1': 1, 'FTA_SSL.1.2': 1, 'FTA_SSL.2.1': 1, 'FTA_SSL.2.2': 1, 'FTA_TAB.1.1': 1, 'FTA_TAH.1.1': 1, 'FTA_TAH.1.2': 1, 'FTA_TAH.1.3': 1}, 'FTP': {'FTP_TRP': 2, 'FTP_TRP.1': 15, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 3}}, 'cc_claims': {'O': {'O.ACCESS': 21, 'O.ACCESS_HISTORY': 7, 'O.ADMIN_ROLE': 7, 'O.ADMIN_TRAINED': 18, 'O.AUDIT_GENERATION': 7, 'O.CONFIG_MGMT': 6, 'O.DISCRETIONARY_ACCESS': 6, 'O.DISCRETIONARY_USER_CONTROL': 7, 'O.DISPLAY_BANNERS': 3, 'O.ENCRYPTED_CHANNEL': 14, 'O.ENCRYPTION_SERVICES': 9, 'O.INSTALL': 4, 'O.MANAGE': 17, 'O.PENETRATION_TEST': 10, 'O.PROTECT': 13, 'O.RECOVERY': 11, 'O.RESIDUAL_INFORMATION': 5, 'O.RESOURCE_SHARING': 5, 'O.SELF_PROTECTION': 11, 'O.SOUND_DESIGN': 4, 'O.SOUND_IMPLEMENTATION': 3, 'O.TESTING': 9, 'O.TRAINED_USERS': 7, 'O.TRUSTED_PATH': 7, 'O.TRUSTED_SYSTEM_OPERATION': 6, 'O.TSF_CRYPTOGRAPHIC_INTEGRITY': 12, 'O.USER_AUTHENTICATION': 14, 'O.USER_IDENTIFICATION': 16, 'O.VULNERABILITY_ANALYSIS': 10, 'O.AUDIT_PROTECTION': 5, 'O.AUDIT_REVIEW': 6, 'O.SOUND_': 1, 'O.DISPLAY_BANNER': 2, 'O.DISCRETIONARY_': 1}, 'T': {'T.ADMIN_ERROR': 3, 'T.ADMIN_ROGUE': 3, 'T.AUDIT_CORRUPT': 3, 'T.CONFIG_CORRUPT': 3, 'T.DOS': 3, 'T.EAVESDROP': 3, 'T.IMPROPER_INSTALLATION': 3, 'T.INSECURE_START': 3, 'T.MASQUERADE': 3, 'T.OBJECTS_NOT_CLEAN': 3, 'T.POOR_DESIGN': 3, 'T.POOR_IMPLEMENTATION': 3, 'T.POOR_TEST': 3, 'T.REPLAY': 3, 'T.SPOOFING': 3, 'T.SYSACC': 3, 'T.UNATTENDED_SESSION': 3, 'T.UNAUTH_ACCESS': 3, 'T.UNAUTH_MODIFICATION': 3, 'T.UNDETECTED_ACTIONS': 2, 'T.UNIDENTIFIED_ACTIONS': 3, 'T.UNKNOWN_STATE': 3, 'T.USER_CORRUPT': 3, 'T.UNDECTED_ACTIONS': 1}, 'A': {'A.PHYSICAL': 4}, 'OE': {'OE.PHYSICAL': 15}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 7}, '3DES': {'TDEA': 5}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 3}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}, 'KA': {'Key Agreement': 7}}, 'crypto_protocol': {'VPN': {'VPN': 1}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 11}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-1': 22, 'FIPS 140-1': 3, 'FIPS PUB 180-1': 5, 'FIPS PUB 186-2': 3, 'FIPS PUB 17110': 1, 'FIPS PUB 17113': 1, 'FIPS PUB 46-3': 3, 'FIPS PUB 17115': 1, 'FIPS PUB 140': 2, 'FIPS PUB 171': 1}, 'X509': {'X.509': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '31f4e49848a16892e3b90c7a5e4669d6bc8c19c7b89b62eeb9b5ceedc670e945', 'txt_hash': 'f3177e383c160e32427ac160f488f6f3b2bc52356fb6f92de706c5c2d60fb028'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2ec36e9a26dd19671cc1654bff812c00204ef8bb35247971357014ed4ef27d40', 'txt_hash': 'ad3ad30244604fdd69ae2430e032d29597eaf2d9d963793fc66ec615bd5e980c'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile for Single-level Operating Systems in Environments Requiring Medium Robustness, Version 1.22 was processed.
Raw data
{
"_id": "c14eb59bda6bec48",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "c14eb59bda6bec48",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP_SLOSPP-MR_V1.22.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PHYSICAL": 4
},
"O": {
"O.ACCESS": 21,
"O.ACCESS_HISTORY": 7,
"O.ADMIN_ROLE": 7,
"O.ADMIN_TRAINED": 18,
"O.AUDIT_GENERATION": 7,
"O.AUDIT_PROTECTION": 5,
"O.AUDIT_REVIEW": 6,
"O.CONFIG_MGMT": 6,
"O.DISCRETIONARY_": 1,
"O.DISCRETIONARY_ACCESS": 6,
"O.DISCRETIONARY_USER_CONTROL": 7,
"O.DISPLAY_BANNER": 2,
"O.DISPLAY_BANNERS": 3,
"O.ENCRYPTED_CHANNEL": 14,
"O.ENCRYPTION_SERVICES": 9,
"O.INSTALL": 4,
"O.MANAGE": 17,
"O.PENETRATION_TEST": 10,
"O.PROTECT": 13,
"O.RECOVERY": 11,
"O.RESIDUAL_INFORMATION": 5,
"O.RESOURCE_SHARING": 5,
"O.SELF_PROTECTION": 11,
"O.SOUND_": 1,
"O.SOUND_DESIGN": 4,
"O.SOUND_IMPLEMENTATION": 3,
"O.TESTING": 9,
"O.TRAINED_USERS": 7,
"O.TRUSTED_PATH": 7,
"O.TRUSTED_SYSTEM_OPERATION": 6,
"O.TSF_CRYPTOGRAPHIC_INTEGRITY": 12,
"O.USER_AUTHENTICATION": 14,
"O.USER_IDENTIFICATION": 16,
"O.VULNERABILITY_ANALYSIS": 10
},
"OE": {
"OE.PHYSICAL": 15
},
"T": {
"T.ADMIN_ERROR": 3,
"T.ADMIN_ROGUE": 3,
"T.AUDIT_CORRUPT": 3,
"T.CONFIG_CORRUPT": 3,
"T.DOS": 3,
"T.EAVESDROP": 3,
"T.IMPROPER_INSTALLATION": 3,
"T.INSECURE_START": 3,
"T.MASQUERADE": 3,
"T.OBJECTS_NOT_CLEAN": 3,
"T.POOR_DESIGN": 3,
"T.POOR_IMPLEMENTATION": 3,
"T.POOR_TEST": 3,
"T.REPLAY": 3,
"T.SPOOFING": 3,
"T.SYSACC": 3,
"T.UNATTENDED_SESSION": 3,
"T.UNAUTH_ACCESS": 3,
"T.UNAUTH_MODIFICATION": 3,
"T.UNDECTED_ACTIONS": 1,
"T.UNDETECTED_ACTIONS": 2,
"T.UNIDENTIFIED_ACTIONS": 3,
"T.UNKNOWN_STATE": 3,
"T.USER_CORRUPT": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT": 3,
"ACM_AUT.1": 9,
"ACM_CAP": 3,
"ACM_CAP.4": 18,
"ACM_SCP": 3,
"ACM_SCP.2": 6
},
"ADO": {
"ADO_DEL": 3,
"ADO_DEL.2": 14,
"ADO_IGS": 3,
"ADO_IGS.1": 12
},
"ADV": {
"ADV_FSP": 3,
"ADV_FSP.2": 24,
"ADV_HLD": 3,
"ADV_HLD.2": 28,
"ADV_IMP": 3,
"ADV_IMP.2": 10,
"ADV_INT": 3,
"ADV_INT.1": 11,
"ADV_LLD": 3,
"ADV_LLD.1": 27,
"ADV_RCR": 3,
"ADV_RCR.1": 7,
"ADV_SPM": 3,
"ADV_SPM.1": 23
},
"AGD": {
"AGD_ADM": 3,
"AGD_ADM.1": 16,
"AGD_USR": 3,
"AGD_USR.1": 10
},
"ALC": {
"ALC_DVS": 3,
"ALC_DVS.1": 11,
"ALC_FLR": 3,
"ALC_FLR.2": 15,
"ALC_LCD": 2,
"ALC_LCD.1": 11,
"ALC_TAT": 3,
"ALC_TAT.1": 12
},
"ATE": {
"ATE_COV": 3,
"ATE_COV.1": 2,
"ATE_COV.2": 6,
"ATE_DPT": 3,
"ATE_DPT.2": 7,
"ATE_FUN": 3,
"ATE_FUN.1": 12,
"ATE_IND": 3,
"ATE_IND.2": 12
},
"AVA": {
"AVA_CCA_EXP": 3,
"AVA_CCA_EXP.1": 11,
"AVA_CCA_EXP.2": 11,
"AVA_MSU": 3,
"AVA_MSU.1": 8,
"AVA_MSU.2": 11,
"AVA_SOF": 3,
"AVA_SOF.1": 13,
"AVA_VLA": 3,
"AVA_VLA.3": 18
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL1": 1,
"EAL3": 1,
"EAL4": 1,
"EAL4+": 2,
"EAL5": 1,
"EAL7": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 8,
"FAU_ARP.1.1": 3,
"FAU_GEN": 2,
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 1,
"FAU_SAA": 2,
"FAU_SAA.1": 6,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_SAR": 2,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 3,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1,
"FAU_SEL": 2,
"FAU_SEL.1": 6,
"FAU_SEL.1.1": 2,
"FAU_STG": 2,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 2,
"FAU_STG.4": 4,
"FAU_STG.4.1": 3
},
"FCS": {
"FCS_BCM_EXP": 2,
"FCS_BCM_EXP.1": 7,
"FCS_BCM_EXP.1.1": 1,
"FCS_BCM_EXP.1.2": 1,
"FCS_CKM": 2,
"FCS_CKM.1": 16,
"FCS_CKM.1.1": 7,
"FCS_CKM.2": 6,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 8,
"FCS_CKM.4.1": 2,
"FCS_CKM_EXP.1": 14,
"FCS_CKM_EXP.1.1": 1,
"FCS_CKM_EXP.1.2": 1,
"FCS_CKM_EXP.2": 21,
"FCS_CKM_EXP.2.5": 1,
"FCS_COP": 2,
"FCS_COP.1": 40,
"FCS_COP.1.1": 12,
"FCS_COP_EXP.1": 16,
"FCS_COP_EXP.1.1": 1,
"FCS_COP_EXP.1.2": 1,
"FCS_COP_EXP.2": 4
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.2": 6,
"FDP_ACC.2.1": 4,
"FDP_ACC.2.2": 3,
"FDP_ACF": 3,
"FDP_ACF.1.1": 1,
"FDP_IFF.1.4": 1,
"FDP_ITT": 2,
"FDP_ITT.1": 6,
"FDP_ITT.1.1": 1,
"FDP_RIP": 2,
"FDP_RIP.2": 8,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1.1": 1,
"FIA_ATD": 2,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS": 2,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 12,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 6,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXP.1": 2,
"FIA_UID": 2,
"FIA_UID.1": 14,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 2,
"FIA_USB.1.1": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 15,
"FMT_MOF.1.1": 2,
"FMT_MSA": 2,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 3,
"FMT_MSA.2": 8,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 2,
"FMT_MSA_EXP.1": 13,
"FMT_MSA_EXP.1.1": 1,
"FMT_MTD": 2,
"FMT_MTD.1": 98,
"FMT_MTD.1.1": 9,
"FMT_REV": 2,
"FMT_REV.1": 20,
"FMT_REV.1.1": 5,
"FMT_REV.1.2": 2,
"FMT_SAE": 2,
"FMT_SAE.1": 12,
"FMT_SAE.1.1": 1,
"FMT_SAE.1.2": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1,
"FMT_SMR.3": 6,
"FMT_SMR.3.1": 1
},
"FPT": {
"FPT_AMT": 2,
"FPT_AMT.1": 6,
"FPT_AMT.1.1": 1,
"FPT_ITT": 2,
"FPT_ITT.1": 8,
"FPT_ITT.1.1": 1,
"FPT_ITT.2.1": 1,
"FPT_ITT.3": 8,
"FPT_ITT.3.1": 2,
"FPT_ITT.3.2": 1,
"FPT_RCV": 2,
"FPT_RCV.1": 10,
"FPT_RCV.1.1": 1,
"FPT_RVM": 2,
"FPT_RVM.1": 10,
"FPT_RVM.1.1": 1,
"FPT_SEP": 2,
"FPT_SEP.2": 6,
"FPT_SEP.2.1": 1,
"FPT_SEP.2.2": 1,
"FPT_SEP.2.3": 3,
"FPT_STM": 2,
"FPT_STM.1": 12,
"FPT_STM.1.1": 1,
"FPT_TDC": 2,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TRC": 2,
"FPT_TRC.1": 8,
"FPT_TRC.1.1": 1,
"FPT_TRC.1.2": 1,
"FPT_TST": 2,
"FPT_TST.1": 44,
"FPT_TST.1.1": 7,
"FPT_TST.1.2": 12,
"FPT_TST.1.3": 9
},
"FRU": {
"FRU_RSA": 2,
"FRU_RSA.1": 8,
"FRU_RSA.1.1": 2
},
"FTA": {
"FTA_SSL": 2,
"FTA_SSL.1": 10,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 1,
"FTA_SSL.2": 10,
"FTA_SSL.2.1": 1,
"FTA_SSL.2.2": 1,
"FTA_TAB": 2,
"FTA_TAB.1": 6,
"FTA_TAB.1.1": 1,
"FTA_TAH": 2,
"FTA_TAH.1": 6,
"FTA_TAH.1.1": 1,
"FTA_TAH.1.2": 1,
"FTA_TAH.1.3": 1
},
"FTP": {
"FTP_TRP": 2,
"FTP_TRP.1": 15,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 7
},
"KEX": {
"Key Exchange": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RNG": 11
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-1": 3,
"FIPS PUB 140": 2,
"FIPS PUB 140-1": 22,
"FIPS PUB 171": 1,
"FIPS PUB 17110": 1,
"FIPS PUB 17113": 1,
"FIPS PUB 17115": 1,
"FIPS PUB 180-1": 5,
"FIPS PUB 186-2": 3,
"FIPS PUB 46-3": 3
},
"X509": {
"X.509": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"TDEA": 5
},
"DES": {
"DES": 7
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Hugo A. Badillo",
"/CreationDate": "D:20010724063231",
"/Creator": "Microsoft Word 9.0",
"/Keywords": "operating system, COTS, medium robustness, single-level, access control, discretionary access control, cryptography",
"/ModDate": "D:20010727150822-04\u002700\u0027",
"/Producer": "Acrobat Distiller 4.05 for Windows",
"/Subject": "Single-level OS PP with DAC for Medium Robustness Environments",
"/Title": "Protection Profile For Single-level Operating Systems In Environments Requiring Medium Robustness",
"pdf_file_size_bytes": 726027,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.itl.nist.gov/fipspubs/fip140-1.htm",
"http://www.itl.nist.gov/fipspubs/fip180-1.htm",
"http://www.iatf.net/",
"http://www.csrc.nist.gov/fips/fips46-3.pdf",
"http://csrc.nist.gov/fips/fips186-2.pdf",
"mailto:[email protected]",
"http://csrc.nist.gov/fips/fips171.txt",
"http://www.iatf.net/protection_profiles/index.cfm"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 111
},
"report_filename": "PP_VID203-VR.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-01-0002": 1
}
},
"cc_claims": {
"A": {
"A.PHYSICAL": 1
},
"T": {
"T.ADMIN_ERROR": 1,
"T.ADMIN_ROGUE": 1,
"T.AUDIT_CORRUPT": 1,
"T.CONFIG_CORRUPT": 1,
"T.DOS": 1,
"T.EAVESDROP": 1,
"T.IMPROPER_INSTALLATION": 1,
"T.INSECURE_START": 1,
"T.MASQUERADE": 1,
"T.OBJECTS_NOT_CLEAN": 1,
"T.POOR_DESIGN": 1,
"T.POOR_IMPLEMENTATION": 1,
"T.POOR_TEST": 1,
"T.REPLAY": 1,
"T.SPOOFING": 1,
"T.SYSACC": 1,
"T.UNATTENDED_SESSION": 1,
"T.UNAUTH_ACCESS": 1,
"T.UNAUTH_MODIFICATION": 1,
"T.UNDETECTED_ACTIONS": 1,
"T.UNIDENTIFIED_ACTIONS": 1,
"T.UNKNOWN_STATE": 1,
"T.USER_CORRUPT": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Simpson",
"/CreationDate": "D:20021129135454-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20021129135529-05\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Section 1",
"pdf_file_size_bytes": 291744,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "31f4e49848a16892e3b90c7a5e4669d6bc8c19c7b89b62eeb9b5ceedc670e945",
"txt_hash": "f3177e383c160e32427ac160f488f6f3b2bc52356fb6f92de706c5c2d60fb028"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2ec36e9a26dd19671cc1654bff812c00204ef8bb35247971357014ed4ef27d40",
"txt_hash": "ad3ad30244604fdd69ae2430e032d29597eaf2d9d963793fc66ec615bd5e980c"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Operating Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile for Single-level Operating Systems in Environments Requiring Medium Robustness, Version 1.22",
"not_valid_after": "2007-09-16",
"not_valid_before": "2001-05-23",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_SLOSPP-MR_V1.22.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VID203-VR.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"status": "archived",
"version": "1.22"
}
}