This page was not yet optimized for use on mobile devices.
US Government Protection Profile for Multi-Level Operating Systems in a Medium Robustness Environments, Version 1.91
Web information ?
Status: archivedCertification date: 2007-03-16
Archived date: 2009-10-01
Scheme: 🇺🇸
Category: Operating Systems
Security level: Medium
Certification report ?
Profile ?
Extracted keywords
Symmetric Algorithms
AES, DES, HMACAsymmetric Algorithms
ECDSA, DSASchemes
MAC, Key agreement, Key AgreementProtocols
IPsecRandomness
PRNG, RNGElliptic Curves
P-256, P-384, P-521Vendor
MicrosoftSecurity level
EAL 4, EAL4, EAL4+, EAL1, EAL3, EAL5, EAL7Claims
O.ACCESS, O.ACCESS_HISTORY, O.ADMIN_ROLE, O.ADMIN_GUIDANCE, O.AUDIT_GENERATION, O.AUDIT_PROTECTION, O.AUDIT_REVIEW, O.CHANGE_MANAGEMENT, O.CORRECT_TSF_OPERATION, O.CRYPTOGRAPHIC_PROTECTION, O.CRYPTOGRAPHIC_SERVICES, O.DISCRETIONARY_ACCESS, O.DISCRETIONARY_USER_CONTROL, O.DISPLAY_BANNER, O.ENCRYPTED_CHANNEL, O.FUNCTIONAL_TESTING, O.INSTALL_GUIDANCE, O.MANAGE, O.MANDATORY_ACCESS, O.MANDATORY_INTEGRITY, O.MARKINGS, O.PENETRATION_TESTING, O.PROTECT, O.RATINGS_MAINTENANCE, O.RECOVERY, O.REPLAY_DETECTION, O.RESIDUAL_INFORMATION, O.RESOURCE_LABELS, O.RESOURCE_SHARING, O.REFERENCE_MONITOR, O.SECURE_STATE, O.SOUND_DESIGN, O.SOUND_IMPLEMENTATION, O.TRAINED_USERS, O.TRUSTED_PATH, O.TSF_CRYPTOGRAPHIC_INTEGRITY, O.USER_AUTHENTICATION, O.USER_IDENTIFICATION, O.VULNERABILITY_ANALYSIS, O.PENETRATION_TEST, O.DISCRETIONARY_USER_CO, O.TSF_CRYPTOGRAPHIC_INTE, O.TRUSTED_SYSTEM_OPERATION, O.CORRECT_TSF, O.CRYPTOGRAPHIC, O.DISCRETIONARY, O.DISPLAY_BANNERS, O.FUNTIONAL_TESTING, O.MANDATORY_INTEGR, O.RATINGS, O.RESIDUAL, O.SOUND, O.FUNCTIONAL, O.TSF_CRYPTOGRAPHIC_I, O.USER, O.VULNERABILITY, T.ADMIN_ERROR, T.ADMIN_ROGUE, T.AUDIT_COMPROMISE, T.CRYPTO_COMPROMISE, T.DATA_NOT_SEPARATED, T.EAVESDROP, T.MASQUERADE, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.POOR_TEST, T.REPLAY, T.RESIDUAL_DATA, T.RESOURCE_EXHAUSTION, T.SPOOFING, T.TSF_COMPROMISE, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNIDENTIFIED_ACTIONS, T.UNKNOWN_STATE, T.CRYPTO, T.DATA_NOT, T.POOR, T.RESOURCE, T.UNATTENDED, T.UNAUTHORIZED, T.UNIDENTIFIED, A.PHYSICAL, OE.PHYSICALSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_ARC, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, ADV_ARC_EXP.1, ADV_FSP_EXP.1, ADV_HLD_EXP.1, ADV_INT_EXP.1, ADV_LLD_EXP.1, ADV_IMP_EXP.2, ADV_ARC_EXP, ADV_FSP_EXP, ADV_HLD_EXP, ADV_IMP_EXP, ADV_INT_EXP, ADV_LLD_EXP, ADV_RCR.1, ADV_SPM.1, ADV_FSP_EXP.2, ADV_HLD_EXP.2, ADV_LLD_EXP.2, ADV_IMP.2, ADV_ING, AGD_ADM, AGD_USR, AGD_ADM.1, AGD_USR.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV_EXP.2, ATE_COV_EXP, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, ATE_COV_EXP.1, ATE_IND.1, ATE_COV.2, AVA_CCA_EXP, AVA_MSU, AVA_SOF, AVA_VLA, AVA_CCA, AVA_CCA_EXP.1, AVA_CCA_EXP.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.3, AMA_AMP, AMA_AMP_EXP.1, AMA_AMP_EXPSecurity Functional Requirements (SFR)
FAU_ARP, FAU_GEN, FAU_SAA, FAU_SAR, FAU_SEL, FAU_STG, FAU_SAR.1.1, FAU_STG.1.2, FAU_ARP.1, FAU_ARP.1.1, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.4, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.4.1, FCO_NRO, FCS_BCM_EXP, FCS_CKM, FCS_COA_EXP, FCS_COP, FCS_CKM.4.1, FCS_CKM_EXP.2.5, FCS_CKM.2.1, FCS_BCM_EXP.1, FCS_CKM_EXP.1, FCS_CKM_EXP.2, FCS_COA_EXP.1, FCS_COP_EXP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_BCM_EXP.1.1, FCS_BCM_EXP.1.2, FCS_BCM_EXP.1.3, FCS_CKM.1.1, FCS_CKM_EXP.1.1, FCS_CKM_EXP.1.2, FCS_COP.1.1, FCS_COP_EXP.1.1, FCS_COP_EXP.1.2, FDP_ACC, FDP_ACF, FDP_ETC, FDP_IFC, FDP_IFF, FDP_ITC, FDP_RIP, FDP_RIP.2.1, FDP_IFF_EXP.2, FDP_ACC.2, FDP_ACF.1, FDP_ETC.2, FDP_IFC.2, FDP_IFF.3, FDP_ITC.1, FDP_ITC.2, FDP_RIP.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF_EXP.2.1, FDP_IFF_EXP.2.2, FDP_IFF_EXP.2.7, FDP_IFF_EXP.2.3, FDP_IFF_EXP.2.4, FDP_IFF_EXP.2.5, FDP_IFF_EXP.2.6, FDP_IFF.3.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.5, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_IFF.2.1, FDP_IFF.2.2, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_USB, FIA_UAU.1.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.6, FIA_UAU.7, FIA_UID.1, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.2, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FMT_MOF, FMT_MSA, FMT_MTD, FMT_REV, FMT_SAE, FMT_SMR, FMT_SMF, FMT_MTD.1, FMT_MTD.1.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_REV.1, FMT_SAE.1, FMT_SMR.2, FMT_SMR.3, FMT_REV.1.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_REV.1.2, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.3.1, FMT_SMF.1, FMT_SMF.1.1, FPT_ITT, FPT_RCV, FPT_RVM, FPT_SEP, FPT_STM, FPT_TRC, FPT_TST, FPT_TRC_EXP.1, FPT_TRC_EXP.1.1, FPT_TST.1.2, FPT_TST_EXP.1, FPT_ITT.1, FPT_ITT.3, FPT_RCV.1, FPT_RPL.1, FPT_RVM.1, FPT_SEP.2, FPT_STM.1, FPT_TST.1, FPT_SMF.1, FPT_ITT.1.1, FPT_ITT.3.1, FPT_ITT.3.2, FPT_RCV.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_RVM.1.1, FPT_SEP.2.1, FPT_SEP.2.2, FPT_SEP.2.3, FPT_STM.1.1, FPT_TST_EXP.1.1, FPT_TST_EXP.1.2, FPT_TST.1.1, FPT_TST.1.3, FPT_TRP_EXP.1, FPT_TRC.1.1, FPT_TRC.1.2, FRU_RSA, FRU_RSA.1, FRU_RSA.1.1, FTA_LSA, FTA_MCS, FTA_SSL, FTA_TAB, FTA_TAH, FTA_TSE, FTA_MCS.1.1, FTA_SSL.1, FTA_LSA.1, FTA_MCS.1, FTA_SSL.2, FTA_TAB.1, FTA_TAH.1, FTA_TSE.1, FTA_LSA.1.1, FTA_MCS.1.2, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTA_TAB.1.1, FTA_TAH.1.1, FTA_TAH.1.2, FTA_TAH.1.3, FTA_TSE.1.1, FTP_TRP, FTP_TRP_EXP.1, FTP_TRP_EXP.1.1, FTP_TRP_EXP.1.2, FTP_TRP_EXP.1.3, FTP_TRP.1.1Standards
FIPS PUB 140-2, FIPS 140-2, FIPS PUB 140-3, FIPS PUB 186-3, FIPS PUB 197, FIPS PUB 180-2, FIPS PUB 140, FIPS PUB 46-3, FIPS PUB 171, FIPS PUB 186-2, PKCS#12, PKCS #8, PKCS #12, PKCS #5, PKCS #11, PKCS#5, PKCS#8, PKCS#11, X.509, CCMB-2005-08-01File metadata
Title | Protection Profile for Multilevel Operating Systems in Environments Requiring Medium Robustness |
---|---|
Subject | Multilevel OS PP with DAC, MAC, and MIC for Medium Robustness Environments |
Keywords | operating system, COTS, medium robustness, multilevel, mandatory access control, discretionary access control, cryptography |
Author | NSA |
Creation date | D:20070320150457-04'00' |
Modification date | D:20070320150903-04'00' |
Pages | 184 |
Creator | Acrobat PDFMaker 7.0.7 for Word |
Producer | Acrobat Distiller 7.0.5 (Windows) |
References ?
No references are available for this protection profile.
Updates ?
-
18.02.2025 The protection profile data changed.
Protection Profile changed
The state of the protection profile object was updated.
- The report property was updated, with the
{'pdf_hash': '8a1775a821fb13dc9f297488e0b28c60ef06551befd6e1f84c3e977ecfac3add'}
data.
- The report property was updated, with the
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name US Government Protection Profile for Multi-Level Operating Systems in a Medium Robustness Environments, Version 1.91 was processed.
Raw data
{
"_id": "e033d512d8b17dcf",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "e033d512d8b17dcf",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP_OS_ML_MR2.0_V1.91.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DSA": {
"DSA": 3
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PHYSICAL": 2
},
"O": {
"O.ACCESS": 16,
"O.ACCESS_HISTORY": 4,
"O.ADMIN_GUIDANCE": 6,
"O.ADMIN_ROLE": 6,
"O.AUDIT_GENERATION": 6,
"O.AUDIT_PROTECTION": 4,
"O.AUDIT_REVIEW": 8,
"O.CHANGE_MANAGEMENT": 6,
"O.CORRECT_TSF": 1,
"O.CORRECT_TSF_OPERATION": 5,
"O.CRYPTOGRAPHIC": 2,
"O.CRYPTOGRAPHIC_PROTECTION": 3,
"O.CRYPTOGRAPHIC_SERVICES": 3,
"O.DISCRETIONARY": 2,
"O.DISCRETIONARY_ACCESS": 3,
"O.DISCRETIONARY_USER_CO": 1,
"O.DISCRETIONARY_USER_CONTROL": 2,
"O.DISPLAY_BANNER": 3,
"O.DISPLAY_BANNERS": 1,
"O.ENCRYPTED_CHANNEL": 6,
"O.FUNCTIONAL": 1,
"O.FUNCTIONAL_TESTING": 8,
"O.FUNTIONAL_TESTING": 1,
"O.INSTALL_GUIDANCE": 4,
"O.MANAGE": 4,
"O.MANDATORY_ACCESS": 8,
"O.MANDATORY_INTEGR": 1,
"O.MANDATORY_INTEGRITY": 3,
"O.MARKINGS": 3,
"O.PENETRATION_TEST": 5,
"O.PENETRATION_TESTING": 4,
"O.PROTECT": 11,
"O.RATINGS": 1,
"O.RATINGS_MAINTENANCE": 3,
"O.RECOVERY": 8,
"O.REFERENCE_MONITOR": 8,
"O.REPLAY_DETECTION": 5,
"O.RESIDUAL": 1,
"O.RESIDUAL_INFORMATION": 3,
"O.RESOURCE_LABELS": 9,
"O.RESOURCE_SHARING": 4,
"O.SECURE_STATE": 4,
"O.SOUND": 1,
"O.SOUND_DESIGN": 6,
"O.SOUND_IMPLEMENTATION": 4,
"O.TRAINED_USERS": 5,
"O.TRUSTED_PATH": 4,
"O.TRUSTED_SYSTEM_OPERATION": 1,
"O.TSF_CRYPTOGRAPHIC_I": 1,
"O.TSF_CRYPTOGRAPHIC_INTE": 1,
"O.TSF_CRYPTOGRAPHIC_INTEGRITY": 2,
"O.USER": 2,
"O.USER_AUTHENTICATION": 5,
"O.USER_IDENTIFICATION": 10,
"O.VULNERABILITY": 1,
"O.VULNERABILITY_ANALYSIS": 9
},
"OE": {
"OE.PHYSICAL": 11
},
"T": {
"T.ADMIN_ERROR": 2,
"T.ADMIN_ROGUE": 2,
"T.AUDIT_COMPROMISE": 2,
"T.CRYPTO": 1,
"T.CRYPTO_COMPROMISE": 1,
"T.DATA_NOT": 1,
"T.DATA_NOT_SEPARATED": 1,
"T.EAVESDROP": 2,
"T.MASQUERADE": 2,
"T.POOR": 1,
"T.POOR_DESIGN": 2,
"T.POOR_IMPLEMENTATION": 1,
"T.POOR_TEST": 2,
"T.REPLAY": 2,
"T.RESIDUAL_DATA": 2,
"T.RESOURCE": 1,
"T.RESOURCE_EXHAUSTION": 1,
"T.SPOOFING": 2,
"T.TSF_COMPROMISE": 2,
"T.UNATTENDED": 1,
"T.UNATTENDED_SESSION": 1,
"T.UNAUTHORIZED": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNIDENTIFIED": 1,
"T.UNIDENTIFIED_ACTIONS": 1,
"T.UNKNOWN_STATE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT": 3,
"ACM_AUT.1": 10,
"ACM_CAP": 3,
"ACM_CAP.4": 20,
"ACM_SCP": 3,
"ACM_SCP.2": 6
},
"ADO": {
"ADO_DEL": 3,
"ADO_DEL.2": 9,
"ADO_IGS": 3,
"ADO_IGS.1": 11
},
"ADV": {
"ADV_ARC": 2,
"ADV_ARC_EXP": 3,
"ADV_ARC_EXP.1": 13,
"ADV_FSP": 2,
"ADV_FSP_EXP": 4,
"ADV_FSP_EXP.1": 17,
"ADV_FSP_EXP.2": 5,
"ADV_HLD": 2,
"ADV_HLD_EXP": 5,
"ADV_HLD_EXP.1": 20,
"ADV_HLD_EXP.2": 2,
"ADV_IMP": 2,
"ADV_IMP.2": 1,
"ADV_IMP_EXP": 1,
"ADV_IMP_EXP.2": 9,
"ADV_ING": 1,
"ADV_INT": 2,
"ADV_INT_EXP": 4,
"ADV_INT_EXP.1": 41,
"ADV_LLD": 2,
"ADV_LLD_EXP": 3,
"ADV_LLD_EXP.1": 20,
"ADV_LLD_EXP.2": 1,
"ADV_RCR": 9,
"ADV_RCR.1": 8,
"ADV_SPM": 3,
"ADV_SPM.1": 16
},
"AGD": {
"AGD_ADM": 4,
"AGD_ADM.1": 13,
"AGD_USR": 3,
"AGD_USR.1": 11
},
"ALC": {
"ALC_DVS": 3,
"ALC_DVS.1": 11,
"ALC_FLR": 4,
"ALC_FLR.2": 15,
"ALC_LCD": 3,
"ALC_LCD.1": 10,
"ALC_TAT": 3,
"ALC_TAT.1": 9
},
"AMA": {
"AMA_AMP": 2,
"AMA_AMP_EXP": 2,
"AMA_AMP_EXP.1": 20
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_COV_EXP": 1,
"ATE_COV_EXP.1": 1,
"ATE_COV_EXP.2": 14,
"ATE_DPT": 3,
"ATE_DPT.2": 7,
"ATE_FUN": 3,
"ATE_FUN.1": 13,
"ATE_IND": 3,
"ATE_IND.1": 1,
"ATE_IND.2": 9
},
"AVA": {
"AVA_CCA": 1,
"AVA_CCA_EXP": 2,
"AVA_CCA_EXP.1": 11,
"AVA_CCA_EXP.2": 12,
"AVA_MSU": 3,
"AVA_MSU.2": 13,
"AVA_SOF": 3,
"AVA_SOF.1": 10,
"AVA_VLA": 5,
"AVA_VLA.3": 25
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL1": 1,
"EAL3": 1,
"EAL4": 7,
"EAL4+": 3,
"EAL5": 1,
"EAL7": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 4,
"FAU_ARP.1.1": 3,
"FAU_GEN": 2,
"FAU_GEN.1": 4,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 3,
"FAU_GEN.2.1": 1,
"FAU_SAA": 2,
"FAU_SAA.1": 2,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_SAR": 2,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 3,
"FAU_SAR.2": 5,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1,
"FAU_SEL": 2,
"FAU_SEL.1": 4,
"FAU_SEL.1.1": 2,
"FAU_STG": 2,
"FAU_STG.1": 3,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 4,
"FAU_STG.4": 4,
"FAU_STG.4.1": 3
},
"FCO": {
"FCO_NRO": 2
},
"FCS": {
"FCS_BCM_EXP": 2,
"FCS_BCM_EXP.1": 7,
"FCS_BCM_EXP.1.1": 1,
"FCS_BCM_EXP.1.2": 1,
"FCS_BCM_EXP.1.3": 1,
"FCS_CKM": 2,
"FCS_CKM.1": 8,
"FCS_CKM.1.1": 7,
"FCS_CKM.2": 4,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 8,
"FCS_CKM.4.1": 4,
"FCS_CKM_EXP.1": 10,
"FCS_CKM_EXP.1.1": 1,
"FCS_CKM_EXP.1.2": 1,
"FCS_CKM_EXP.2": 16,
"FCS_CKM_EXP.2.5": 2,
"FCS_COA_EXP": 2,
"FCS_COA_EXP.1": 7,
"FCS_COP": 2,
"FCS_COP.1": 19,
"FCS_COP.1.1": 25,
"FCS_COP_EXP.1": 14,
"FCS_COP_EXP.1.1": 1,
"FCS_COP_EXP.1.2": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.2": 8,
"FDP_ACC.2.1": 3,
"FDP_ACC.2.2": 3,
"FDP_ACF": 2,
"FDP_ACF.1": 5,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC": 3,
"FDP_ETC.2": 8,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC": 2,
"FDP_IFC.2": 6,
"FDP_IFC.2.1": 6,
"FDP_IFC.2.2": 6,
"FDP_IFF": 3,
"FDP_IFF.2.1": 1,
"FDP_IFF.2.2": 1,
"FDP_IFF.3": 4,
"FDP_IFF.3.1": 1,
"FDP_IFF_EXP.2": 12,
"FDP_IFF_EXP.2.1": 2,
"FDP_IFF_EXP.2.2": 2,
"FDP_IFF_EXP.2.3": 2,
"FDP_IFF_EXP.2.4": 2,
"FDP_IFF_EXP.2.5": 2,
"FDP_IFF_EXP.2.6": 2,
"FDP_IFF_EXP.2.7": 4,
"FDP_ITC": 2,
"FDP_ITC.1": 8,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 5,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 3,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 4,
"FDP_RIP": 2,
"FDP_RIP.2": 6,
"FDP_RIP.2.1": 2
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 2,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS": 2,
"FIA_SOS.1": 10,
"FIA_SOS.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 3,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UAU.6": 4,
"FIA_UAU.6.1": 3,
"FIA_UAU.7": 3,
"FIA_UAU.7.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 4,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 2,
"FIA_USB.1": 12,
"FIA_USB.1.1": 1
},
"FMT": {
"FMT_MOF": 3,
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 4,
"FMT_MSA": 3,
"FMT_MSA.1": 16,
"FMT_MSA.1.1": 12,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 3,
"FMT_MSA.3": 5,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 3,
"FMT_MTD.1": 29,
"FMT_MTD.1.1": 13,
"FMT_REV": 3,
"FMT_REV.1": 19,
"FMT_REV.1.1": 5,
"FMT_REV.1.2": 6,
"FMT_SAE": 3,
"FMT_SAE.1": 4,
"FMT_SAE.1.1": 1,
"FMT_SAE.1.2": 3,
"FMT_SMF": 2,
"FMT_SMF.1": 3,
"FMT_SMF.1.1": 1,
"FMT_SMR": 4,
"FMT_SMR.2": 7,
"FMT_SMR.2.1": 2,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 3,
"FMT_SMR.3": 3,
"FMT_SMR.3.1": 1
},
"FPT": {
"FPT_ITT": 2,
"FPT_ITT.1": 4,
"FPT_ITT.1.1": 1,
"FPT_ITT.3": 9,
"FPT_ITT.3.1": 1,
"FPT_ITT.3.2": 1,
"FPT_RCV": 2,
"FPT_RCV.1": 10,
"FPT_RCV.1.1": 1,
"FPT_RPL.1": 3,
"FPT_RPL.1.1": 3,
"FPT_RPL.1.2": 4,
"FPT_RVM": 23,
"FPT_RVM.1": 12,
"FPT_RVM.1.1": 1,
"FPT_SEP": 28,
"FPT_SEP.2": 7,
"FPT_SEP.2.1": 1,
"FPT_SEP.2.2": 1,
"FPT_SEP.2.3": 3,
"FPT_SMF.1": 1,
"FPT_STM": 2,
"FPT_STM.1": 4,
"FPT_STM.1.1": 1,
"FPT_TRC": 2,
"FPT_TRC.1.1": 1,
"FPT_TRC.1.2": 1,
"FPT_TRC_EXP.1": 10,
"FPT_TRC_EXP.1.1": 3,
"FPT_TRP_EXP.1": 2,
"FPT_TST": 4,
"FPT_TST.1": 14,
"FPT_TST.1.1": 6,
"FPT_TST.1.2": 11,
"FPT_TST.1.3": 6,
"FPT_TST_EXP.1": 7,
"FPT_TST_EXP.1.1": 1,
"FPT_TST_EXP.1.2": 1
},
"FRU": {
"FRU_RSA": 3,
"FRU_RSA.1": 10,
"FRU_RSA.1.1": 3
},
"FTA": {
"FTA_LSA": 2,
"FTA_LSA.1": 4,
"FTA_LSA.1.1": 3,
"FTA_MCS": 2,
"FTA_MCS.1": 5,
"FTA_MCS.1.1": 4,
"FTA_MCS.1.2": 3,
"FTA_SSL": 2,
"FTA_SSL.1": 7,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 3,
"FTA_SSL.2": 4,
"FTA_SSL.2.1": 1,
"FTA_SSL.2.2": 3,
"FTA_TAB": 2,
"FTA_TAB.1": 4,
"FTA_TAB.1.1": 1,
"FTA_TAH": 2,
"FTA_TAH.1": 3,
"FTA_TAH.1.1": 1,
"FTA_TAH.1.2": 1,
"FTA_TAH.1.3": 1,
"FTA_TSE": 2,
"FTA_TSE.1": 4,
"FTA_TSE.1.1": 1
},
"FTP": {
"FTP_TRP": 2,
"FTP_TRP.1.1": 1,
"FTP_TRP_EXP.1": 10,
"FTP_TRP_EXP.1.1": 2,
"FTP_TRP_EXP.1.2": 1,
"FTP_TRP_EXP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 4,
"Key agreement": 1
},
"MAC": {
"MAC": 15
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 8,
"P-384": 8,
"P-521": 8
}
},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RNG": 51
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2005-08-01": 1
},
"FIPS": {
"FIPS 140-2": 5,
"FIPS PUB 140": 1,
"FIPS PUB 140-2": 20,
"FIPS PUB 140-3": 1,
"FIPS PUB 171": 1,
"FIPS PUB 180-2": 2,
"FIPS PUB 186-2": 1,
"FIPS PUB 186-3": 7,
"FIPS PUB 197": 2,
"FIPS PUB 46-3": 1
},
"PKCS": {
"PKCS #11": 2,
"PKCS #12": 2,
"PKCS #5": 2,
"PKCS #8": 2,
"PKCS#11": 1,
"PKCS#12": 3,
"PKCS#5": 1,
"PKCS#8": 1
},
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"HMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "NSA",
"/Company": "NSA",
"/CreationDate": "D:20070320150457-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0.7 for Word",
"/Keywords": "operating system, COTS, medium robustness, multilevel, mandatory access control, discretionary access control, cryptography",
"/ModDate": "D:20070320150903-04\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/SourceModified": "D:20070320185811",
"/Subject": "Multilevel OS PP with DAC, MAC, and MIC for Medium Robustness Environments",
"/Title": "Protection Profile for Multilevel Operating Systems in Environments Requiring Medium Robustness",
"pdf_file_size_bytes": 1196513,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://cs-www.ncsl.nist.gov/publication/fips/fips46-3/fips46-3.pdf",
"mailto:[email protected]",
"http://www.rsasecurity.com/rsalabs/pkcs/pkcs-5/index.html",
"http://www.atis.org/tg2k/_information_technology.html",
"http://www.fas.org/irp/offdocs/nsd/",
"http://www.rsasecurity.com/rsalabs/pkcs/pkcs-12/index.html",
"http://csrc.nist.gov/CryptoToolkit/kms/keyschemes-Jan03.pdf",
"http://www.rsasecurity.com/rsalabs/pkcs/pkcs-11/index.html",
"http://csrc.ncsl.nist.gov/CryptoToolkit/tkrng",
"http://csrc.ncsl.nist.gov/rng",
"http://cs-www.ncsl.nist.gov/publications/fips/fips140-2/fips1402.pdf",
"http://cs-www.ncsl.nist.gov/publications/nistpubs/800-22/sp-800-22-051501.pdf",
"http://iase.disa.mil/pki/roadmap.html",
"http://cs-www.ncsl.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf",
"http://www.niap-ccevs.org/cc-scheme/pp/",
"http://iase.disa.mil/policy.html#pki",
"http://cs-www.ncsl.nist.gov/publications/fips/fips171/fips171.txt",
"http://www.rsasecurity.com/rsalabs/pkcs/pkcs-8/index.html",
"http://cs-www.ncsl.nist.gov/publications/fips/fips180-2/fips180-2.pdf",
"http://webstore.ansi.org/ansidocstore/find.asp"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 184
},
"report_filename": "",
"report_keywords": null,
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0470b1459e10c320396a694102eb109feee8545eb90256e6b73dacfc6bab35be",
"txt_hash": "b1188a50b22a2ba5d5152b777afd68cc7567e14eb88bc42e7740aa24b83ab766"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "8a1775a821fb13dc9f297488e0b28c60ef06551befd6e1f84c3e977ecfac3add",
"txt_hash": null
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Operating Systems",
"is_collaborative": false,
"maintenances": [],
"name": "US Government Protection Profile for Multi-Level Operating Systems in a Medium Robustness Environments, Version 1.91",
"not_valid_after": "2009-10-01",
"not_valid_before": "2007-03-16",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_ML_MR2.0_V1.91.pdf",
"report_link": "https://www.commoncriteriaportal.org#no_cert",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"Medium"
]
},
"status": "archived",
"version": "1.91"
}
}