This page was not yet optimized for use on mobile devices.
MCU Root of Trust Protection Profile (GPT_SPE_146, version 1.0)
Web information ?
Status: activeCertification date: 2023-03-01
Scheme: 🇫🇷
Category: Trusted Computing
Security level: EAL2+, ADV_FSP.3, ALC_FLR.3
Certification report ?
Extracted keywords
Symmetric Algorithms
DESTrusted Execution Environments
TEESecurity level
EAL 2Security Assurance Requirements (SAR)
ACE_CCL.1, ACE_ECD.1, ACE_INT.1, ACE_OBJ.1, ACE_REQ.1, ACE_SPD.1, ACE_MCO.1, ACE_CCO.1, ALC_FLR.2, AVA_VAN.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAR.1, FAU_STG.1, FCO_NRO.1, FCS_RNG.1, FCS_COP.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ITT.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FPT_INI.1, FPT_FLS.1, FPT_STM.1, FPT_TEE.1, FTP_ITT.1Protection profiles
ANSSI-CC-PP-2023/01Certificates
ANSSI-CC-PP-2023/01Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Profile ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
RSA 2048Hash functions
SHA-256Randomness
RNGTrusted Execution Environments
TrustZone, SE, TEESecurity level
EAL 2+, EAL 2, EAL 2 augmentedClaims
O.AROT_AUTHENTICITY, O.ATTESTATION, O.CA_AROT_IDENTIFICATION, O.INITIALISATION, O.INSTANCE_TIME, O.KEYS_USAGE, O.MCU_ROT_DATA_PROTECTION, O.MCU_ROT_ID, O.MCU_ROT_ISOLATION, O.OPERATION, O.RNG, O.ROLLBACK_PROTECTION, O.RUNTIME_INTEGRITY, O.TRUSTED_STORAGE, O.RUNTIME_CONFIDENTIALITY, O.MCU_ROT_DATA_PROTECTI, O.AROT_PERSISTENT_TIME, O.DEBUG, O.AROT_ISOLATION, T.ABUSE_DEBUG, T.ABUSE_FUNCT, T.CLONE, T.FLASH_DUMP, T.IMPERSONATION, T.MCU_ROT_FIRMWARE_DOWNGRADE, T.PERTURBATION, T.RAM, T.RNG, T.ROGUE_CODE_EXECUTION, T.ROLLBACK, T.SPY, T.STORAGE_CORRUPTION, T.AROT_PERSISTENT_TIME, T.ABUSE_AROT, T.MCU_ROT_FIRMWARE_DOWNGR, A.AROT_DEVELOPMENT, A.PROTECTION_AFTER_DELIVERY, OP.USE_KEY, OP.EXTRACT_KEY, OP.LOAD, OP.STORE, OP.AUTHENTICATE, OP.DEBUG, OE.AROT_DEVELOPMENT, OE.DISABLED_DEBUG, OE.INTEGRATION_CONFIGURATION, OE.PROTECTION_AFTER_DELIVERY, OE.SECRETS, OE.UNIQUE_MCU_ROT_ID, OSP.CRYPTO_API, OSP.INTEGRATION_CONFIGURATION, OSP.SECRETS, OSP.UNIQUE_MCU_ROT_IDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAR.1, FAU_STG.1, FAU_ARP.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_SAA.1, FAU_GEN.1, FCO_NRO, FCO_NRO.1, FCS_RNG, FCS_COP, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FDP_IFC, FDP_IFF, FDP_ITT, FDP_RIP, FDP_ACC, FDP_ACF, FDP_SDI.2, FDP_ROL, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ITT.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_ATD, FIA_UID, FIA_USB, FIA_ATD.1.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UAU.2, FIA_UAU.6, FIA_UAU, FIA_UID.1, FMT_SMR.1, FMT_MSA, FMT_SMF.1, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MSA.1, FMT_MSA.3, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MTD.1, FPT_INI, FPT_ITT, FPT_FLS.1, FPT_INI.1, FPT_TEE.1, FPT_STM, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_INI.1.4, FPT_ITT.1, FPT_STM.1, FPT_FLS.1.1, FPT_TEE.1.1, FPT_TEE.1.2Side-channel analysis
side-channels, fault injectionCertification process
out of scope, 2.2.1 and 2.2.2 respectively. The security functionality provided by the Application RoTs is out of scope of the TOE. MCU Root of Trust Protection Profile – Public Release v1.0 19 /93 Copyright Ó, apply to the TOE operational environment and its actors. Note that the operational environment is out of scope of the evaluation. 4.5.1 Core MCU RoT PP The assumptions applicable to the core MCU RoT PP are the, policies that apply to the environment. Application Note: • The TOE operational environment is out of scope of the evaluation. The security guidelines must include recommendations to cover all the TOEStandards
FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-4, AIS 31, AIS31, RFC 2119, RFC 4122, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004References ?
No references are available for this protection profile.
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name MCU Root of Trust Protection Profile (GPT_SPE_146, version 1.0) was processed.
Raw data
{
"_id": "c69650699764b6a2",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "c69650699764b6a2",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "anssi-profil-cc-pp-2023_01en.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AROT_DEVELOPMENT": 4,
"A.PROTECTION_AFTER_DELIVERY": 4
},
"O": {
"O.AROT_AUTHENTICITY": 17,
"O.AROT_ISOLATION": 22,
"O.AROT_PERSISTENT_TIME": 12,
"O.ATTESTATION": 8,
"O.CA_AROT_IDENTIFICATION": 10,
"O.DEBUG": 17,
"O.INITIALISATION": 20,
"O.INSTANCE_TIME": 8,
"O.KEYS_USAGE": 14,
"O.MCU_ROT_DATA_PROTECTI": 2,
"O.MCU_ROT_DATA_PROTECTION": 15,
"O.MCU_ROT_ID": 9,
"O.MCU_ROT_ISOLATION": 14,
"O.OPERATION": 15,
"O.RNG": 8,
"O.ROLLBACK_PROTECTION": 10,
"O.RUNTIME_CONFIDENTIALITY": 21,
"O.RUNTIME_INTEGRITY": 17,
"O.TRUSTED_STORAGE": 21
},
"OE": {
"OE.AROT_DEVELOPMENT": 8,
"OE.DISABLED_DEBUG": 6,
"OE.INTEGRATION_CONFIGURATION": 10,
"OE.PROTECTION_AFTER_DELIVERY": 7,
"OE.SECRETS": 5,
"OE.UNIQUE_MCU_ROT_ID": 6
},
"OP": {
"OP.AUTHENTICATE": 3,
"OP.DEBUG": 3,
"OP.EXTRACT_KEY": 4,
"OP.LOAD": 3,
"OP.STORE": 4,
"OP.USE_KEY": 4
},
"OSP": {
"OSP.CRYPTO_API": 2,
"OSP.INTEGRATION_CONFIGURATION": 5,
"OSP.SECRETS": 5,
"OSP.UNIQUE_MCU_ROT_ID": 4
},
"T": {
"T.ABUSE_AROT": 4,
"T.ABUSE_DEBUG": 6,
"T.ABUSE_FUNCT": 12,
"T.AROT_PERSISTENT_TIME": 4,
"T.CLONE": 8,
"T.FLASH_DUMP": 3,
"T.IMPERSONATION": 5,
"T.MCU_ROT_FIRMWARE_DOWNGR": 1,
"T.MCU_ROT_FIRMWARE_DOWNGRADE": 5,
"T.PERTURBATION": 7,
"T.RAM": 7,
"T.RNG": 4,
"T.ROGUE_CODE_EXECUTION": 7,
"T.ROLLBACK": 4,
"T.SPY": 4,
"T.STORAGE_CORRUPTION": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 3,
"ADV_FSP.2": 13,
"ADV_TDS.1": 8
},
"AGD": {
"AGD_OPE.1": 10,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 2,
"ALC_DEL.1": 1,
"ALC_FLR.2": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 4,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 1,
"ASE_SPD.1": 3,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 3
},
"AVA": {
"AVA_VAN.2": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 8,
"EAL 2 augmented": 3,
"EAL 2+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 9,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 4,
"FAU_SAA.1": 2,
"FAU_SAR.1": 8,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.1": 4
},
"FCS": {
"FCS_CKM.1": 7,
"FCS_CKM.4": 6,
"FCS_COP": 42,
"FCS_COP.1": 5,
"FCS_RNG": 3,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 36,
"FDP_ACC.1": 13,
"FDP_ACF": 35,
"FDP_ACF.1": 17,
"FDP_IFC": 18,
"FDP_IFC.1": 7,
"FDP_IFC.2": 3,
"FDP_IFF": 24,
"FDP_IFF.1": 20,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_ITT": 15,
"FDP_ITT.1": 4,
"FDP_RIP": 6,
"FDP_RIP.1": 2,
"FDP_ROL": 7,
"FDP_ROL.1": 3,
"FDP_SDI.2": 17,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_ATD": 9,
"FIA_ATD.1": 14,
"FIA_ATD.1.1": 1,
"FIA_UAU": 12,
"FIA_UAU.2": 1,
"FIA_UAU.6": 2,
"FIA_UID": 10,
"FIA_UID.1": 4,
"FIA_UID.2": 11,
"FIA_UID.2.1": 1,
"FIA_USB": 8,
"FIA_USB.1": 15,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 44,
"FMT_MSA.1": 6,
"FMT_MSA.3": 14,
"FMT_MTD": 6,
"FMT_MTD.1": 2,
"FMT_SMF": 7,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR": 8,
"FMT_SMR.1": 21,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 17,
"FPT_FLS.1.1": 1,
"FPT_INI": 3,
"FPT_INI.1": 13,
"FPT_INI.1.1": 3,
"FPT_INI.1.2": 3,
"FPT_INI.1.3": 2,
"FPT_INI.1.4": 2,
"FPT_ITT": 10,
"FPT_ITT.1": 2,
"FPT_STM": 12,
"FPT_STM.1": 4,
"FPT_TEE.1": 7,
"FPT_TEE.1.1": 1,
"FPT_TEE.1.2": 1
}
},
"certification_process": {
"OutOfScope": {
"2.2.1 and 2.2.2 respectively. The security functionality provided by the Application RoTs is out of scope of the TOE. MCU Root of Trust Protection Profile \u2013 Public Release v1.0 19 /93 Copyright \u00d3": 1,
"apply to the TOE operational environment and its actors. Note that the operational environment is out of scope of the evaluation. 4.5.1 Core MCU RoT PP The assumptions applicable to the core MCU RoT PP are the": 1,
"out of scope": 3,
"policies that apply to the environment. Application Note: \u2022 The TOE operational environment is out of scope of the evaluation. The security guidelines must include recommendations to cover all the TOE": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 30
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"side-channels": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 1,
"AIS31": 3
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS PUB 180-4": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1
},
"RFC": {
"RFC 2119": 3,
"RFC 4122": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"TDES": 2
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {
"ARM": {
"TrustZone": 1
},
"IBM": {
"SE": 1
},
"other": {
"TEE": 7
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": null,
"report_filename": "anssi-cc-pp-2023_01fr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2023/01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2023/01": 2
}
},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 1,
"ACE_INT.1": 1,
"ACE_MCO.1": 1,
"ACE_OBJ.1": 1,
"ACE_REQ.1": 1,
"ACE_SPD.1": 1
},
"ALC": {
"ALC_FLR.2": 3
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1,
"FAU_SAR.1": 1,
"FAU_STG.1": 1
},
"FCO": {
"FCO_NRO.1": 1
},
"FCS": {
"FCS_COP.1": 1,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_IFC.2": 1,
"FDP_IFF.1": 1,
"FDP_ITT.1": 1,
"FDP_RIP.1": 1,
"FDP_ROL.1": 1,
"FDP_SDI.2": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_UID.2": 1,
"FIA_USB.1": 1
},
"FMT": {
"FMT_MSA.1": 1,
"FMT_MSA.3": 1,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_INI.1": 1,
"FPT_STM.1": 1,
"FPT_TEE.1": 1
},
"FTP": {
"FTP_ITT.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"other": {
"TEE": 4
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "8ce592a906309d337569d48caf14e65261ac143ad6658427331e6019327435ec",
"txt_hash": "741afe7efeefa135799bfc318a7d377227910ea2cd072075c101cb748236113b"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "9d5a947b09f32a78a9eb964c0fbbf430939cd977437a022c31c08d315eb8962f",
"txt_hash": "baadfc62e71c30c19c724c6bc88b271885be4aa7b2935fb768528be96967a2a4"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Trusted Computing",
"is_collaborative": false,
"maintenances": [],
"name": "MCU Root of Trust Protection Profile (GPT_SPE_146, version 1.0)",
"not_valid_after": null,
"not_valid_before": "2023-03-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-cc-pp-2023_01en.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2023_01fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ADV_FSP.3",
"ALC_FLR.3"
]
},
"status": "active",
"version": "1.0"
}
}