This page was not yet optimized for use on mobile devices.
Baseboard Management Controller Protection Profile with Firmware update Module
Web information
Status: activeCertification date: 2022-11-14
Scheme: 🇫🇷
Category: Other Devices and Systems
Security level: EAL2+, ALC_FLR.1
Certification report
Extracted keywords
Symmetric Algorithms
DESSecurity level
EAL 2, EAL2Security Assurance Requirements (SAR)
ACE_CCL.1, ACE_ECD.1, ACE_INT.1, ACE_OBJ.1, ACE_REQ.1, ACE_SPD.1, ACE_MCO.1, ACE_CCO.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.3, FCS_RNG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UAU.7, FIA_UID.2, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FPT_FPV.1, FPT_FWU.1, FPT_FLS.1, FPT_RCV.3, FPT_STM.1, FPT_TST.1, FTA_SSL.3, FTA_TAB.1, FTA_TSE.1, FTP_ITC.1, FTP_TRP.1Protection profiles
ANSSI-CC-PP-2022/01Certificates
ANSSI-CC-PP-2022/01Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | ANSSI-CC-PP-2022/01 |
---|---|
Subject | Baseboard Management Controller Protection Profile with Firmware update module |
Keywords | [ANSSI Crypto] <ou [SOG-IS Crypto]> |
Author | Leveziel Florian |
Creation date | D:20221117150630+01'00' |
Modification date | D:20221117150630+01'00' |
Pages | 11 |
Creator | Microsoft® Word 2019 |
Producer | Microsoft® Word 2019 |
Profile
Extracted keywords
Randomness
RNGTrusted Execution Environments
SEVendor
Huawei Technologies Co, HuaweiSecurity level
EAL2, EAL2 augmentedSecurity Assurance Requirements (SAR)
AGD_OPE.1, ALC_FLR.1, ALC_FLRSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_RNG, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM.2, FDP_ITC.1, FDP_ITC.2, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UAU.7, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.2.1, FIA_UID.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_SMF, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMT.1, FPT_FPV.1, FPT_FWU.1, FPT_FLS.1, FPT_RCV.3, FPT_STM.1, FPT_TST.1, FPT_FPV.1.1, FPT_FPV.1.2, FPT_FWU.1.1, FPT_FWU.1.2, FPT_FLS.1.1, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TST, FTA_SSL.3, FTA_TAB.1, FTA_TSE.1, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TSE.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Protection profiles
BSI-CC-PP-0084-2014Side-channel analysis
physical tampering, fault induction, JILCertification process
out of scope, measurements are the first line of defence of operational environment at network level, they are out of scope of the TOE but recommended. The networks outside the operational environment and before the gateway, shall specify methods in chapter 6.2.14 FIA_UAU.5. The methods performed by a remote entity is out of scope of the TOE, yet the communication between the TOE and the remote entity shall be secured by trusted, the GS’s service plane, usually conducts other services and interfaces with other components out of scope of the TOE, it is essential to define that no other management functionality or application shall, with the management operation of the TOE. Such seamless and non-conflicting operational policy is out of scope of the TOE and belongs to the administrator of the cloud or data centre. 4.3.1.5 OE, which means storage outside the GS. This backup place of audit records and logging file is out of scope of the TOE. End of the application note. 6.2.6 FAU_STG.3 Action in Case of Possible Audit Data LossStandards
AIS 31File metadata
Title | Protection Profile for a Baseboard Management Controller |
---|---|
Subject | Protection Profile |
Author | Huawei Technologies Co.,Ltd. |
Creation date | D:20221021093416+02'00' |
Modification date | D:20221021100710+02'00' |
Pages | 96 |
Creator | Microsoft® Word 2019 |
Producer | Microsoft® Word 2019 |
References
No references are available for this protection profile.
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1416919, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 11, '/Title': 'ANSSI-CC-PP-2022/01', '/Author': 'Leveziel Florian', '/Subject': 'Baseboard Management Controller Protection Profile with Firmware update module', '/Keywords': '[ANSSI Crypto] <ou [SOG-IS Crypto]>', '/Creator': 'Microsoft® Word 2019', '/CreationDate': "D:20221117150630+01'00'", '/ModDate': "D:20221117150630+01'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'http://www.ssi.gouv.fr/', 'http://www.sogis.eu/', 'mailto:[email protected]']}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 1395936, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 96, '/Author': 'Huawei Technologies Co.,Ltd.', '/CreationDate': "D:20221021093416+02'00'", '/Creator': 'Microsoft® Word 2019', '/ModDate': "D:20221021100710+02'00'", '/Producer': 'Microsoft® Word 2019', '/Subject': 'Protection Profile', '/Title': 'Protection Profile for a Baseboard Management Controller', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.huawei.com/']}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-PP-2022/01': 12}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2022/01': 12}}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ACE': {'ACE_CCL.1': 1, 'ACE_ECD.1': 1, 'ACE_INT.1': 1, 'ACE_OBJ.1': 1, 'ACE_REQ.1': 1, 'ACE_SPD.1': 1, 'ACE_MCO.1': 1, 'ACE_CCO.1': 1}, 'APE': {'APE_CCL.1': 1, 'APE_ECD.1': 1, 'APE_INT.1': 1, 'APE_OBJ.2': 1, 'APE_REQ.2': 1, 'APE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.2': 1, 'FAU_SAR.1': 1, 'FAU_SAR.2': 1, 'FAU_STG.1': 1, 'FAU_STG.3': 1}, 'FCS': {'FCS_RNG.1': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 1, 'FCS_COP.1': 1}, 'FIA': {'FIA_AFL.1': 1, 'FIA_SOS.1': 1, 'FIA_UAU.2': 1, 'FIA_UAU.5': 1, 'FIA_UAU.7': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_FPV.1': 1, 'FPT_FWU.1': 1, 'FPT_FLS.1': 1, 'FPT_RCV.3': 1, 'FPT_STM.1': 1, 'FPT_TST.1': 1}, 'FTA': {'FTA_SSL.3': 1, 'FTA_TAB.1': 1, 'FTA_TSE.1': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL2': 2, 'EAL2 augmented': 2}}, 'cc_sar': {'AGD': {'AGD_OPE.1': 2}, 'ALC': {'ALC_FLR.1': 11, 'ALC_FLR': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 15, 'FAU_GEN.2': 9, 'FAU_SAR.1': 9, 'FAU_SAR.2': 7, 'FAU_STG.1': 9, 'FAU_STG.3': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1}, 'FCS': {'FCS_RNG': 2, 'FCS_CKM.1': 10, 'FCS_CKM.4': 10, 'FCS_COP.1': 20, 'FCS_RNG.1': 9, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ITC.1': 4, 'FDP_ITC.2': 2}, 'FIA': {'FIA_AFL.1': 6, 'FIA_SOS.1': 7, 'FIA_UAU.2': 13, 'FIA_UAU.5': 10, 'FIA_UAU.7': 9, 'FIA_UID.2': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_MOF.1': 13, 'FMT_SMF.1': 19, 'FMT_SMR.1': 12, 'FMT_SMF': 12, 'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMT.1': 1}, 'FPT': {'FPT_FPV.1': 22, 'FPT_FWU.1': 12, 'FPT_FLS.1': 12, 'FPT_RCV.3': 9, 'FPT_STM.1': 13, 'FPT_TST.1': 9, 'FPT_FPV.1.1': 6, 'FPT_FPV.1.2': 2, 'FPT_FWU.1.1': 2, 'FPT_FWU.1.2': 4, 'FPT_FLS.1.1': 1, 'FPT_RCV.3.1': 1, 'FPT_RCV.3.2': 1, 'FPT_RCV.3.3': 1, 'FPT_RCV.3.4': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TST': 2}, 'FTA': {'FTA_SSL.3': 11, 'FTA_TAB.1': 6, 'FTA_TSE.1': 8, 'FTA_SSL.3.1': 1, 'FTA_TAB.1.1': 1, 'FTA_TSE.1.1': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_TRP.1': 14, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {}, 'vendor': {'Huawei': {'Huawei Technologies Co': 2, 'Huawei': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 28}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 2, 'fault induction': 1}, 'other': {'JIL': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 6, 'measurements are the first line of defence of operational environment at network level, they are out of scope of the TOE but recommended. The networks outside the operational environment and before the gateway': 1, 'shall specify methods in chapter 6.2.14 FIA_UAU.5. The methods performed by a remote entity is out of scope of the TOE, yet the communication between the TOE and the remote entity shall be secured by trusted': 2, 'the GS’s service plane, usually conducts other services and interfaces with other components out of scope of the TOE, it is essential to define that no other management functionality or application shall': 1, 'with the management operation of the TOE. Such seamless and non-conflicting operational policy is out of scope of the TOE and belongs to the administrator of the cloud or data centre. 4.3.1.5 OE': 1, 'which means storage outside the GS. This backup place of audit records and logging file is out of scope of the TOE. End of the application note. 6.2.6 FAU_STG.3 Action in Case of Possible Audit Data Loss': 1}}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '033195cd0206743645467091f80376349c93048391b454e01de0313169b81486', 'txt_hash': '1a297f5a4caa2e646fbcecd3b09522242b5269c44dff84c9dfbb67406571c331'}
data. - The report property was updated, with the
{'convert_ok': True, 'extract_ok': True, 'pdf_hash': '532b8dd374f19977268f593744e3abdb1793d34f5c000c1353c0dde3850b44b6', 'txt_hash': 'ccb49bf7856270b56127a5963042dc31836fee5eb36f8dd2adf85ba48947172c'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Baseboard Management Controller Protection Profile with Firmware update Module was processed.
Raw data
{
"_id": "ea2b21b40726b393",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "ea2b21b40726b393",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "anssi-profil-pp-2022_01en.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"AGD": {
"AGD_OPE.1": 2
},
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.1": 11
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL2 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 15,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 9,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 9,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 7,
"FAU_SAR.2.1": 1,
"FAU_STG.1": 9,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 5,
"FAU_STG.3.1": 1
},
"FCS": {
"FCS_CKM.1": 10,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 10,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 20,
"FCS_COP.1.1": 1,
"FCS_RNG": 2,
"FCS_RNG.1": 9,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ITC.1": 4,
"FDP_ITC.2": 2
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU.2": 13,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 10,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 9,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 2,
"FIA_UID.2": 10,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 13,
"FMT_MOF.1.1": 1,
"FMT_SMF": 12,
"FMT_SMF.1": 19,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMT.1": 1
},
"FPT": {
"FPT_FLS.1": 12,
"FPT_FLS.1.1": 1,
"FPT_FPV.1": 22,
"FPT_FPV.1.1": 6,
"FPT_FPV.1.2": 2,
"FPT_FWU.1": 12,
"FPT_FWU.1.1": 2,
"FPT_FWU.1.2": 4,
"FPT_RCV.3": 9,
"FPT_RCV.3.1": 1,
"FPT_RCV.3.2": 1,
"FPT_RCV.3.3": 1,
"FPT_RCV.3.4": 1,
"FPT_STM.1": 13,
"FPT_STM.1.1": 1,
"FPT_TST": 2,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 11,
"FTA_SSL.3.1": 1,
"FTA_TAB.1": 6,
"FTA_TAB.1.1": 1,
"FTA_TSE.1": 8,
"FTA_TSE.1.1": 1
},
"FTP": {
"FTP_ITC.1": 13,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 14,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"measurements are the first line of defence of operational environment at network level, they are out of scope of the TOE but recommended. The networks outside the operational environment and before the gateway": 1,
"out of scope": 6,
"shall specify methods in chapter 6.2.14 FIA_UAU.5. The methods performed by a remote entity is out of scope of the TOE, yet the communication between the TOE and the remote entity shall be secured by trusted": 2,
"the GS\u2019s service plane, usually conducts other services and interfaces with other components out of scope of the TOE, it is essential to define that no other management functionality or application shall": 1,
"which means storage outside the GS. This backup place of audit records and logging file is out of scope of the TOE. End of the application note. 6.2.6 FAU_STG.3 Action in Case of Possible Audit Data Loss": 1,
"with the management operation of the TOE. Such seamless and non-conflicting operational policy is out of scope of the TOE and belongs to the administrator of the cloud or data centre. 4.3.1.5 OE": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 28
}
},
"side_channel_analysis": {
"FI": {
"fault induction": 1,
"physical tampering": 2
},
"other": {
"JIL": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 2
}
},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 2,
"Huawei Technologies Co": 2
}
},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Huawei Technologies Co.,Ltd.",
"/CreationDate": "D:20221021093416+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20221021100710+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"/Subject": "Protection Profile",
"/Title": "Protection Profile for a Baseboard Management Controller",
"pdf_file_size_bytes": 1395936,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.huawei.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 96
},
"report_filename": "anssi-cc-pp-2022_01fr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2022/01": 12
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2022/01": 12
}
},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 1,
"ACE_INT.1": 1,
"ACE_MCO.1": 1,
"ACE_OBJ.1": 1,
"ACE_REQ.1": 1,
"ACE_SPD.1": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_GEN.2": 1,
"FAU_SAR.1": 1,
"FAU_SAR.2": 1,
"FAU_STG.1": 1,
"FAU_STG.3": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 1,
"FCS_RNG.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_SOS.1": 1,
"FIA_UAU.2": 1,
"FIA_UAU.5": 1,
"FIA_UAU.7": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_FPV.1": 1,
"FPT_FWU.1": 1,
"FPT_RCV.3": 1,
"FPT_STM.1": 1,
"FPT_TST.1": 1
},
"FTA": {
"FTA_SSL.3": 1,
"FTA_TAB.1": 1,
"FTA_TSE.1": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Leveziel Florian",
"/CreationDate": "D:20221117150630+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/Keywords": "[ANSSI Crypto] \u003cou [SOG-IS Crypto]\u003e",
"/ModDate": "D:20221117150630+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"/Subject": "Baseboard Management Controller Protection Profile with Firmware update module",
"/Title": "ANSSI-CC-PP-2022/01",
"pdf_file_size_bytes": 1416919,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"http://www.sogis.eu/",
"mailto:[email protected]",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 11
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "033195cd0206743645467091f80376349c93048391b454e01de0313169b81486",
"txt_hash": "1a297f5a4caa2e646fbcecd3b09522242b5269c44dff84c9dfbb67406571c331"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "532b8dd374f19977268f593744e3abdb1793d34f5c000c1353c0dde3850b44b6",
"txt_hash": "ccb49bf7856270b56127a5963042dc31836fee5eb36f8dd2adf85ba48947172c"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Baseboard Management Controller Protection Profile with Firmware update Module",
"not_valid_after": null,
"not_valid_before": "2022-11-14",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2022_01en.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2022_01fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.1"
]
},
"status": "active",
"version": "1.0"
}
}