MCU Root of Trust Protection Profile (GPT_SPE_146, version 1.0)

Web information ?

Status: active
Certification date: 2023-03-01
Scheme: 🇫🇷
Category: Trusted Computing
Security level: EAL2+, ADV_FSP.3, ALC_FLR.3

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Trusted Execution Environments
TEE

Security level
EAL 2
Security Assurance Requirements (SAR)
ACE_CCL.1, ACE_ECD.1, ACE_INT.1, ACE_OBJ.1, ACE_REQ.1, ACE_SPD.1, ACE_MCO.1, ACE_CCO.1, ALC_FLR.2, AVA_VAN.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAR.1, FAU_STG.1, FCO_NRO.1, FCS_RNG.1, FCS_COP.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ITT.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FPT_INI.1, FPT_FLS.1, FPT_STM.1, FPT_TEE.1, FTP_ITT.1
Protection profiles
ANSSI-CC-PP-2023/01
Certificates
ANSSI-CC-PP-2023/01

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

Profile ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES
Asymmetric Algorithms
RSA 2048
Hash functions
SHA-256
Randomness
RNG

Trusted Execution Environments
TrustZone, SE, TEE

Security level
EAL 2+, EAL 2, EAL 2 augmented
Claims
O.AROT_AUTHENTICITY, O.ATTESTATION, O.CA_AROT_IDENTIFICATION, O.INITIALISATION, O.INSTANCE_TIME, O.KEYS_USAGE, O.MCU_ROT_DATA_PROTECTION, O.MCU_ROT_ID, O.MCU_ROT_ISOLATION, O.OPERATION, O.RNG, O.ROLLBACK_PROTECTION, O.RUNTIME_INTEGRITY, O.TRUSTED_STORAGE, O.RUNTIME_CONFIDENTIALITY, O.MCU_ROT_DATA_PROTECTI, O.AROT_PERSISTENT_TIME, O.DEBUG, O.AROT_ISOLATION, T.ABUSE_DEBUG, T.ABUSE_FUNCT, T.CLONE, T.FLASH_DUMP, T.IMPERSONATION, T.MCU_ROT_FIRMWARE_DOWNGRADE, T.PERTURBATION, T.RAM, T.RNG, T.ROGUE_CODE_EXECUTION, T.ROLLBACK, T.SPY, T.STORAGE_CORRUPTION, T.AROT_PERSISTENT_TIME, T.ABUSE_AROT, T.MCU_ROT_FIRMWARE_DOWNGR, A.AROT_DEVELOPMENT, A.PROTECTION_AFTER_DELIVERY, OP.USE_KEY, OP.EXTRACT_KEY, OP.LOAD, OP.STORE, OP.AUTHENTICATE, OP.DEBUG, OE.AROT_DEVELOPMENT, OE.DISABLED_DEBUG, OE.INTEGRATION_CONFIGURATION, OE.PROTECTION_AFTER_DELIVERY, OE.SECRETS, OE.UNIQUE_MCU_ROT_ID, OSP.CRYPTO_API, OSP.INTEGRATION_CONFIGURATION, OSP.SECRETS, OSP.UNIQUE_MCU_ROT_ID
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAR.1, FAU_STG.1, FAU_ARP.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_SAA.1, FAU_GEN.1, FCO_NRO, FCO_NRO.1, FCS_RNG, FCS_COP, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FDP_IFC, FDP_IFF, FDP_ITT, FDP_RIP, FDP_ACC, FDP_ACF, FDP_SDI.2, FDP_ROL, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ITT.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_ATD, FIA_UID, FIA_USB, FIA_ATD.1.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UAU.2, FIA_UAU.6, FIA_UAU, FIA_UID.1, FMT_SMR.1, FMT_MSA, FMT_SMF.1, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MSA.1, FMT_MSA.3, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MTD.1, FPT_INI, FPT_ITT, FPT_FLS.1, FPT_INI.1, FPT_TEE.1, FPT_STM, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_INI.1.4, FPT_ITT.1, FPT_STM.1, FPT_FLS.1.1, FPT_TEE.1.1, FPT_TEE.1.2

Side-channel analysis
side-channels, fault injection
Certification process
out of scope, 2.2.1 and 2.2.2 respectively. The security functionality provided by the Application RoTs is out of scope of the TOE. MCU Root of Trust Protection Profile – Public Release v1.0 19 /93 Copyright Ó, apply to the TOE operational environment and its actors. Note that the operational environment is out of scope of the evaluation. 4.5.1 Core MCU RoT PP The assumptions applicable to the core MCU RoT PP are the, policies that apply to the environment. Application Note: • The TOE operational environment is out of scope of the evaluation. The security guidelines must include recommendations to cover all the TOE

Standards
FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-4, AIS 31, AIS31, RFC 2119, RFC 4122, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

References ?

No references are available for this protection profile.

Updates ?

  • 04.02.2025 The protection profile was first processed.
    New Protection Profile

    A new Protection Profile with the name MCU Root of Trust Protection Profile (GPT_SPE_146, version 1.0) was processed.

Raw data

{
  "_id": "c69650699764b6a2",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "c69650699764b6a2",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "anssi-profil-cc-pp-2023_01en.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.AROT_DEVELOPMENT": 4,
          "A.PROTECTION_AFTER_DELIVERY": 4
        },
        "O": {
          "O.AROT_AUTHENTICITY": 17,
          "O.AROT_ISOLATION": 22,
          "O.AROT_PERSISTENT_TIME": 12,
          "O.ATTESTATION": 8,
          "O.CA_AROT_IDENTIFICATION": 10,
          "O.DEBUG": 17,
          "O.INITIALISATION": 20,
          "O.INSTANCE_TIME": 8,
          "O.KEYS_USAGE": 14,
          "O.MCU_ROT_DATA_PROTECTI": 2,
          "O.MCU_ROT_DATA_PROTECTION": 15,
          "O.MCU_ROT_ID": 9,
          "O.MCU_ROT_ISOLATION": 14,
          "O.OPERATION": 15,
          "O.RNG": 8,
          "O.ROLLBACK_PROTECTION": 10,
          "O.RUNTIME_CONFIDENTIALITY": 21,
          "O.RUNTIME_INTEGRITY": 17,
          "O.TRUSTED_STORAGE": 21
        },
        "OE": {
          "OE.AROT_DEVELOPMENT": 8,
          "OE.DISABLED_DEBUG": 6,
          "OE.INTEGRATION_CONFIGURATION": 10,
          "OE.PROTECTION_AFTER_DELIVERY": 7,
          "OE.SECRETS": 5,
          "OE.UNIQUE_MCU_ROT_ID": 6
        },
        "OP": {
          "OP.AUTHENTICATE": 3,
          "OP.DEBUG": 3,
          "OP.EXTRACT_KEY": 4,
          "OP.LOAD": 3,
          "OP.STORE": 4,
          "OP.USE_KEY": 4
        },
        "OSP": {
          "OSP.CRYPTO_API": 2,
          "OSP.INTEGRATION_CONFIGURATION": 5,
          "OSP.SECRETS": 5,
          "OSP.UNIQUE_MCU_ROT_ID": 4
        },
        "T": {
          "T.ABUSE_AROT": 4,
          "T.ABUSE_DEBUG": 6,
          "T.ABUSE_FUNCT": 12,
          "T.AROT_PERSISTENT_TIME": 4,
          "T.CLONE": 8,
          "T.FLASH_DUMP": 3,
          "T.IMPERSONATION": 5,
          "T.MCU_ROT_FIRMWARE_DOWNGR": 1,
          "T.MCU_ROT_FIRMWARE_DOWNGRADE": 5,
          "T.PERTURBATION": 7,
          "T.RAM": 7,
          "T.RNG": 4,
          "T.ROGUE_CODE_EXECUTION": 7,
          "T.ROLLBACK": 4,
          "T.SPY": 4,
          "T.STORAGE_CORRUPTION": 6
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 13,
          "ADV_TDS.1": 8
        },
        "AGD": {
          "AGD_OPE.1": 10,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 2,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 4
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 4,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 5,
          "ATE_FUN.1": 3
        },
        "AVA": {
          "AVA_VAN.2": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 8,
          "EAL 2 augmented": 3,
          "EAL 2+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 9,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 4,
          "FAU_SAA.1": 2,
          "FAU_SAR.1": 8,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 7,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.1": 4
        },
        "FCS": {
          "FCS_CKM.1": 7,
          "FCS_CKM.4": 6,
          "FCS_COP": 42,
          "FCS_COP.1": 5,
          "FCS_RNG": 3,
          "FCS_RNG.1": 13,
          "FCS_RNG.1.1": 3,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 36,
          "FDP_ACC.1": 13,
          "FDP_ACF": 35,
          "FDP_ACF.1": 17,
          "FDP_IFC": 18,
          "FDP_IFC.1": 7,
          "FDP_IFC.2": 3,
          "FDP_IFF": 24,
          "FDP_IFF.1": 20,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 6,
          "FDP_ITT": 15,
          "FDP_ITT.1": 4,
          "FDP_RIP": 6,
          "FDP_RIP.1": 2,
          "FDP_ROL": 7,
          "FDP_ROL.1": 3,
          "FDP_SDI.2": 17,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_ATD": 9,
          "FIA_ATD.1": 14,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 12,
          "FIA_UAU.2": 1,
          "FIA_UAU.6": 2,
          "FIA_UID": 10,
          "FIA_UID.1": 4,
          "FIA_UID.2": 11,
          "FIA_UID.2.1": 1,
          "FIA_USB": 8,
          "FIA_USB.1": 15,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA": 44,
          "FMT_MSA.1": 6,
          "FMT_MSA.3": 14,
          "FMT_MTD": 6,
          "FMT_MTD.1": 2,
          "FMT_SMF": 7,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 8,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 17,
          "FPT_FLS.1.1": 1,
          "FPT_INI": 3,
          "FPT_INI.1": 13,
          "FPT_INI.1.1": 3,
          "FPT_INI.1.2": 3,
          "FPT_INI.1.3": 2,
          "FPT_INI.1.4": 2,
          "FPT_ITT": 10,
          "FPT_ITT.1": 2,
          "FPT_STM": 12,
          "FPT_STM.1": 4,
          "FPT_TEE.1": 7,
          "FPT_TEE.1.1": 1,
          "FPT_TEE.1.2": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "2.2.1 and 2.2.2 respectively. The security functionality provided by the Application RoTs is out of scope of the TOE. MCU Root of Trust Protection Profile \u2013 Public Release v1.0 19 /93 Copyright \u00d3": 1,
          "apply to the TOE operational environment and its actors. Note that the operational environment is out of scope of the evaluation. 4.5.1 Core MCU RoT PP The assumptions applicable to the core MCU RoT PP are the": 1,
          "out of scope": 3,
          "policies that apply to the environment. Application Note: \u2022 The TOE operational environment is out of scope of the evaluation. The security guidelines must include recommendations to cover all the TOE": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 30
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        },
        "SCA": {
          "side-channels": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1,
          "AIS31": 3
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1
        },
        "RFC": {
          "RFC 2119": 3,
          "RFC 4122": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "TDES": 2
          },
          "DES": {
            "DES": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "TrustZone": 1
        },
        "IBM": {
          "SE": 1
        },
        "other": {
          "TEE": 7
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "pp_metadata": null,
    "report_filename": "anssi-cc-pp-2023_01fr.pdf",
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-PP-2023/01": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2023/01": 2
        }
      },
      "cc_sar": {
        "ACE": {
          "ACE_CCL.1": 1,
          "ACE_CCO.1": 1,
          "ACE_ECD.1": 1,
          "ACE_INT.1": 1,
          "ACE_MCO.1": 1,
          "ACE_OBJ.1": 1,
          "ACE_REQ.1": 1,
          "ACE_SPD.1": 1
        },
        "ALC": {
          "ALC_FLR.2": 3
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1,
          "FAU_SAR.1": 1,
          "FAU_STG.1": 1
        },
        "FCO": {
          "FCO_NRO.1": 1
        },
        "FCS": {
          "FCS_COP.1": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_IFC.2": 1,
          "FDP_IFF.1": 1,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 1,
          "FDP_ROL.1": 1,
          "FDP_SDI.2": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_UID.2": 1,
          "FIA_USB.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 1,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_INI.1": 1,
          "FPT_STM.1": 1,
          "FPT_TEE.1": 1
        },
        "FTP": {
          "FTP_ITT.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "other": {
          "TEE": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": null
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "pdf_hash": "8ce592a906309d337569d48caf14e65261ac143ad6658427331e6019327435ec",
      "txt_hash": "741afe7efeefa135799bfc318a7d377227910ea2cd072075c101cb748236113b"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "pdf_hash": "9d5a947b09f32a78a9eb964c0fbbf430939cd977437a022c31c08d315eb8962f",
      "txt_hash": "baadfc62e71c30c19c724c6bc88b271885be4aa7b2935fb768528be96967a2a4"
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "Trusted Computing",
    "is_collaborative": false,
    "maintenances": [],
    "name": "MCU Root of Trust Protection Profile (GPT_SPE_146, version 1.0)",
    "not_valid_after": null,
    "not_valid_before": "2023-03-01",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-cc-pp-2023_01en.pdf",
    "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2023_01fr.pdf",
    "scheme": "FR",
    "security_level": {
      "_type": "Set",
      "elements": [
        "EAL2+",
        "ADV_FSP.3",
        "ALC_FLR.3"
      ]
    },
    "status": "active",
    "version": "1.0"
  }
}