This page was not yet optimized for use on mobile devices.
U.S. Government Directory Protection Profile for Medium Robustness Environments, Version 1.1
Web information ?
Status: archivedCertification date: 2007-07-25
Archived date: 2009-10-01
Scheme: 🇺🇸
Category: Operating Systems
Security level: Medium
Certification report ?
Extracted keywords
File metadata
Title | ASSURANCE CONTINUITY MAINTENANCE REPORT FOR |
---|---|
Author | paolson |
Creation date | D:20071121110547-05'00' |
Modification date | D:20071121110606-05'00' |
Pages | 1 |
Creator | Acrobat PDFMaker 7.0 for Word |
Producer | Acrobat Distiller 7.0 (Windows) |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, DES, SkipjackAsymmetric Algorithms
ECDSA, DSAHash functions
SHA-256, SHA-384, SHA-512Schemes
Key Exchange, Key AgreementProtocols
SSL, TLS, VPNRandomness
PRNG, RNGElliptic Curves
P-256, P-384, P-521Security level
EAL2, EAL3Claims
O.ADMIN_ROLE, O.AUDIT_, O.AUDIT_REVIEW, O.CHANGE_, O.CORRECT_TSF_, O.CRYPTOGRAPHY_, O.CRYPTOGRAPHIC_, O.DISPLAY_BANNER, O.DOCUMENT_KEY_, O.MAINT_MODE, O.MANAGE, O.MEDIATE, O.NONREPUDIATION, O.REPLAY_, O.DISTRIBUTED_DIR, O.RESIDUAL_, O.RESOURCE_, O.ROBUST_ADMIN_, O.ROBUST_TOE_, O.SELF_, O.SOUND_DESIGN, O.SOUND_, O.THOROUGH_, O.TIME_STAMPS, O.TRUSTED_PATH, O.VULNERABILITY_, O.ADMIN_ROLES, O.ROBUST_ADMIN_GUIDANCE, O.AUDIT_PROTECTION, O.RESIDUAL_INFORMATION, O.SELF_PROTECTION, O.CRYPTOGRAPHY_VALIDATED, O.CRYPTOGRAPHIC_FUNCTIONS, O.DOCUMENT_KEY_LEAKAGE, O.ROBUST_TOE_ACCESS, O.CHANGE_MANAGEMENT, O.VULNERABILITY_ANALYSIS_, O.VULNERABILITY_ANALYSIS_TEST, O.SOUND_IMPLEMENTATION, O.THOROUGH_FUNCTIONAL_, O.THOROUGH_FUNCTIONAL_TESTING, O.CORRECT_, O.REPLAY_DETECTION, O.RESOURCE_SHARING, O.CORRECT_TSF_OPERATION, O.AUDIT_GENERATION, O.DISTRIBUTED_DIRECTORY_SUPPORT, O.DISTRIBUTED_DIRECTORY_SUPPOR, O.REPLICATION, T.ADMIN_ROGUE, T.AUDIT_, T.CORRUPTED_, T.CRYPTO_, T.FLAWED_DESIGN, T.MALICIOUS_TSF_, T.MASQUERADE, T.POOR_TEST, T.REPLAY, T.RESIDUAL_DATA, T.RESOURCE_, T.SPOOFING, T.UNATTENDED_, T.UNAUTHORIZED_, T.UNIDENTIFIED_, T.UNKNOWN_, T.ADMIN_ERROR, T.ADMIN_ROUTE, T.AUDIT_COMPROMISE, T.CRYPTO_COMPROMISE, T.CORRUPTED_IMPLEMENTATION, T.RESOURCE_EXHAUSTION, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNIDENTIFIED_ACTIONS, T.UNKNOWN_STATE, A.PHYSICAL, A.NO_GENERAL_PURPOSE, A.REMOTE_ADUA_ENVIRONMENT, A.REMOTE_ADUA_FUNCTIONALITY, A.DISTIRBUTED_DIRECTORY_SECURITY_, A.USER_INFORMATION_FLOW, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.REMOTE_ADUA_ENVIRONMENT, OE.REMOTE_ADUA_FUNCTIONALITY, OE.DISTRIBUTED_DIRECTORY_SECURI, OE.EVIDENCE_OF_RECEIPT_OF_REPLI, OE.TRUSTED_PATH, OE.USER_INFORMATION_FLOW, OE.NONREPUDIATION, OE.EVIDENCE_OF_RECEIPT_OF_REPLICA_DATASecurity Assurance Requirements (SAR)
ACM_AUT.1, ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.3, ADV_TDS.4, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, ADV_INT.1, ADV_IMP.2, ADV_OPE.1, AGD_OPE.1, AGD_PRE.1, AGD_ADM, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ALC_FLR, ALC_CMC.4, ALC_CMS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.4Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN, FAU_SAA, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL, FAU_STG, FAU_STG.3, FAU_ARP.1.1, FAU_GEN.1, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1, FAU_STG.1, FAU_STG.3.1, FAU_ARP, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM, FCS_BCM, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP, FCS_COP.1.1, FDP_ACC.2, FDP_ACF.1, FDP_RIP.2, FDP_ITC.2, FDP_ETC.2, FDP_ACC, FDP_ACF.1.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.2.1, FDP_ITC.1, FDP_ACC.1, FDP_IFC.1, FDP_ACF, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_USB.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_ATD, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_AFL, FIA_UAU, FIA_USB, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MTD.1, FMT_MTD.2, FMT_SMF.1, FMT_SMR.2, FMT_MOF, FMT_MTD, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR, FPT_ITA.1, FPT_RCV.2, FPT_RPL.1, FPT_STM.1, FPT_TDC.1, FPT_TST.1, FPT_ITA.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST_EXP.1, FPT_TST_EXP.1.1, FPT_TST_EXP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_RCV, FPT_TDC, FRU_RSA.1, FRU_RSA.1.1, FTA_SSL.1, FTA_SSL.2, FTA_SSL.3, FTA_TAB.1, FTA_TSE.1, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TSE.1.1, FTA_SSL, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP_EXP.1Standards
FIPS 140-2, FIPS 186-2, FIPS PUB 140-2, FIPS PUB 140-3, FIPS PUB 186-3, FIPS PUB 140, NIST SP 800-57, PKCS #1, ISO/IEC 15408:1999, X.509File metadata
Title | US Government Directory Protection Profile For Medium Robustness Environments |
---|---|
Author | CygnaCom for NSA |
Creation date | D:20071205122151-05'00' |
Modification date | D:20071205123121-05'00' |
Pages | 159 |
Creator | Acrobat PDFMaker 8.1 for Word |
Producer | Acrobat Distiller 8.1.0 (Windows) |
References ?
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name U.S. Government Directory Protection Profile for Medium Robustness Environments, Version 1.1 was processed.
Raw data
{
"_id": "ff5b8c4dca5f0981",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "ff5b8c4dca5f0981",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP_DIR_MR_V1.1.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DSA": {
"DSA": 11
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.DISTIRBUTED_DIRECTORY_SECURITY_": 1,
"A.NO_GENERAL_PURPOSE": 3,
"A.PHYSICAL": 1,
"A.REMOTE_ADUA_ENVIRONMENT": 1,
"A.REMOTE_ADUA_FUNCTIONALITY": 1,
"A.USER_INFORMATION_FLOW": 1
},
"O": {
"O.ADMIN_ROLE": 6,
"O.ADMIN_ROLES": 1,
"O.AUDIT_": 2,
"O.AUDIT_GENERATION": 2,
"O.AUDIT_PROTECTION": 4,
"O.AUDIT_REVIEW": 3,
"O.CHANGE_": 1,
"O.CHANGE_MANAGEMENT": 4,
"O.CORRECT_": 3,
"O.CORRECT_TSF_": 1,
"O.CORRECT_TSF_OPERATION": 1,
"O.CRYPTOGRAPHIC_": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 6,
"O.CRYPTOGRAPHY_": 1,
"O.CRYPTOGRAPHY_VALIDATED": 3,
"O.DISPLAY_BANNER": 5,
"O.DISTRIBUTED_DIR": 1,
"O.DISTRIBUTED_DIRECTORY_SUPPOR": 1,
"O.DISTRIBUTED_DIRECTORY_SUPPORT": 2,
"O.DOCUMENT_KEY_": 2,
"O.DOCUMENT_KEY_LEAKAGE": 2,
"O.MAINT_MODE": 4,
"O.MANAGE": 6,
"O.MEDIATE": 3,
"O.NONREPUDIATION": 4,
"O.REPLAY_": 1,
"O.REPLAY_DETECTION": 3,
"O.REPLICATION": 1,
"O.RESIDUAL_": 1,
"O.RESIDUAL_INFORMATION": 6,
"O.RESOURCE_": 1,
"O.RESOURCE_SHARING": 2,
"O.ROBUST_ADMIN_": 1,
"O.ROBUST_ADMIN_GUIDANCE": 4,
"O.ROBUST_TOE_": 1,
"O.ROBUST_TOE_ACCESS": 6,
"O.SELF_": 1,
"O.SELF_PROTECTION": 9,
"O.SOUND_": 1,
"O.SOUND_DESIGN": 4,
"O.SOUND_IMPLEMENTATION": 3,
"O.THOROUGH_": 1,
"O.THOROUGH_FUNCTIONAL_": 4,
"O.THOROUGH_FUNCTIONAL_TESTING": 2,
"O.TIME_STAMPS": 4,
"O.TRUSTED_PATH": 10,
"O.VULNERABILITY_": 1,
"O.VULNERABILITY_ANALYSIS_": 4,
"O.VULNERABILITY_ANALYSIS_TEST": 5
},
"OE": {
"OE.DISTRIBUTED_DIRECTORY_SECURI": 1,
"OE.EVIDENCE_OF_RECEIPT_OF_REPLI": 1,
"OE.EVIDENCE_OF_RECEIPT_OF_REPLICA_DATA": 4,
"OE.NONREPUDIATION": 1,
"OE.NO_GENERAL_PURPOSE": 1,
"OE.PHYSICAL": 1,
"OE.REMOTE_ADUA_ENVIRONMENT": 1,
"OE.REMOTE_ADUA_FUNCTIONALITY": 1,
"OE.TRUSTED_PATH": 5,
"OE.USER_INFORMATION_FLOW": 1
},
"T": {
"T.ADMIN_ERROR": 2,
"T.ADMIN_ROGUE": 3,
"T.ADMIN_ROUTE": 1,
"T.AUDIT_": 1,
"T.AUDIT_COMPROMISE": 1,
"T.CORRUPTED_": 1,
"T.CORRUPTED_IMPLEMENTATION": 1,
"T.CRYPTO_": 1,
"T.CRYPTO_COMPROMISE": 1,
"T.FLAWED_DESIGN": 2,
"T.MALICIOUS_TSF_": 2,
"T.MASQUERADE": 2,
"T.POOR_TEST": 2,
"T.REPLAY": 2,
"T.RESIDUAL_DATA": 2,
"T.RESOURCE_": 1,
"T.RESOURCE_EXHAUSTION": 1,
"T.SPOOFING": 2,
"T.UNATTENDED_": 1,
"T.UNATTENDED_SESSION": 1,
"T.UNAUTHORIZED_": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNIDENTIFIED_": 1,
"T.UNIDENTIFIED_ACTIONS": 1,
"T.UNKNOWN_": 1,
"T.UNKNOWN_STATE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1
},
"ADV": {
"ADV_ARC.1": 21,
"ADV_FSP.1": 2,
"ADV_FSP.2": 3,
"ADV_FSP.4": 1,
"ADV_FSP.5": 21,
"ADV_IMP.1": 16,
"ADV_IMP.2": 1,
"ADV_INT.1": 4,
"ADV_INT.3": 9,
"ADV_OPE.1": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 27
},
"AGD": {
"AGD_ADM": 1,
"AGD_OPE.1": 19,
"AGD_PRE.1": 15
},
"ALC": {
"ALC_CMC.4": 20,
"ALC_CMS.1": 1,
"ALC_CMS.4": 12,
"ALC_DEL.1": 9,
"ALC_DVS.1": 11,
"ALC_FLR": 1,
"ALC_FLR.2": 19,
"ALC_LCD.1": 12,
"ALC_TAT.1": 14
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 12,
"ATE_DPT.3": 13,
"ATE_FUN.1": 17,
"ATE_IND.2": 13
},
"AVA": {
"AVA_VAN.4": 17
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL3": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 12,
"FAU_ARP.1.1": 1,
"FAU_GEN": 15,
"FAU_GEN.1": 8,
"FAU_GEN.2": 1,
"FAU_SAA": 9,
"FAU_SAA.1": 2,
"FAU_SAR.1": 14,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 2,
"FAU_SAR.2": 7,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 8,
"FAU_SAR.3.1": 1,
"FAU_SEL": 7,
"FAU_SEL.1": 1,
"FAU_STG": 22,
"FAU_STG.1": 4,
"FAU_STG.3": 9,
"FAU_STG.3.1": 1
},
"FCS": {
"FCS_BCM": 1,
"FCS_CKM": 3,
"FCS_CKM.1": 29,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 11,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 14,
"FCS_CKM.4.1": 1,
"FCS_COP": 5,
"FCS_COP.1": 44,
"FCS_COP.1.1": 14
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 2,
"FDP_ACC.2": 7,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC.2": 1,
"FDP_IFC.1": 1,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1,
"FDP_RIP.2": 7,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 10,
"FIA_AFL.1.2": 1,
"FIA_ATD": 1,
"FIA_ATD.1": 19,
"FIA_ATD.1.1": 3,
"FIA_UAU": 2,
"FIA_UAU.1": 11,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.2": 7,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 12,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 2,
"FIA_UID.1": 3,
"FIA_UID.2": 10,
"FIA_UID.2.1": 1,
"FIA_USB": 1,
"FIA_USB.1": 10
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 16,
"FMT_MOF.1.1": 2,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 4,
"FMT_MSA.3": 2,
"FMT_MTD": 4,
"FMT_MTD.1": 38,
"FMT_MTD.1.1": 4,
"FMT_MTD.2": 20,
"FMT_MTD.2.1": 2,
"FMT_MTD.2.2": 4,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 9,
"FMT_SMR.2": 16,
"FMT_SMR.2.1": 2,
"FMT_SMR.2.2": 2,
"FMT_SMR.2.3": 4
},
"FPT": {
"FPT_ITA.1": 7,
"FPT_ITA.1.1": 1,
"FPT_RCV": 1,
"FPT_RCV.2": 9,
"FPT_RPL.1": 9,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TDC": 1,
"FPT_TDC.1": 12,
"FPT_TDC.1.1": 2,
"FPT_TDC.1.2": 2,
"FPT_TST.1": 24,
"FPT_TST.1.1": 6,
"FPT_TST.1.2": 6,
"FPT_TST.1.3": 6,
"FPT_TST_EXP.1": 1,
"FPT_TST_EXP.1.1": 1,
"FPT_TST_EXP.1.2": 1
},
"FRU": {
"FRU_RSA.1": 14,
"FRU_RSA.1.1": 2
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL.1": 9,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 1,
"FTA_SSL.2": 7,
"FTA_SSL.2.1": 1,
"FTA_SSL.2.2": 1,
"FTA_SSL.3": 14,
"FTA_SSL.3.1": 2,
"FTA_TAB.1": 8,
"FTA_TAB.1.1": 1,
"FTA_TSE.1": 8,
"FTA_TSE.1.1": 1
},
"FTP": {
"FTP_ITC.1": 4,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 1,
"FTP_TRP_EXP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"KEX": {
"Key Exchange": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 4,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RNG": 7
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 15,
"FIPS 186-2": 1,
"FIPS PUB 140": 1,
"FIPS PUB 140-2": 12,
"FIPS PUB 140-3": 1,
"FIPS PUB 186-3": 3
},
"ISO": {
"ISO/IEC 15408:1999": 1
},
"NIST": {
"NIST SP 800-57": 7
},
"PKCS": {
"PKCS #1": 1
},
"X509": {
"X.509": 9
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"DES": {
"DES": 3
}
},
"miscellaneous": {
"Skipjack": {
"Skipjack": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "CygnaCom for NSA",
"/Company": "DOD",
"/CreationDate": "D:20071205122151-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 8.1 for Word",
"/ModDate": "D:20071205123121-05\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/SourceModified": "D:20071205161035",
"/Title": "US Government Directory Protection Profile For Medium Robustness Environments ",
"pdf_file_size_bytes": 891894,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ietf.org/rfc/2459.txt",
"http://www.niap-ccevs.org/cc-scheme/pp/",
"http://www.ietf.org/rfc/rfc2528.txt"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 159
},
"report_filename": "pp_dir_mr_v1.1-add1.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "paolson",
"/Company": "DoD",
"/CreationDate": "D:20071121110547-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0 for Word",
"/ModDate": "D:20071121110606-05\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/SourceModified": "D:20071107142630",
"/Title": "ASSURANCE CONTINUITY MAINTENANCE REPORT FOR ",
"pdf_file_size_bytes": 40138,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5fef425a1a4f2532b13a8067738849875e2c94b53c55455bb7a0119783f7bf56",
"txt_hash": "6bac8cee7d71388ac0cf3b6858da321e91b299bf4488c52999a7ac7bda75748f"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ba7ae92d0352aed0179b9402be1e6989749d893cb2522f022b1cbf8cecad0cd2",
"txt_hash": "d56c3ada41d22fbf681f591f076e5a294742c2eef24dd69b98902b5cb8e71859"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Operating Systems",
"is_collaborative": false,
"maintenances": [],
"name": "U.S. Government Directory Protection Profile for Medium Robustness Environments, Version 1.1",
"not_valid_after": "2009-10-01",
"not_valid_before": "2007-07-25",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_DIR_MR_V1.1.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_dir_mr_v1.1-add1.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"Medium"
]
},
"status": "archived",
"version": "1.1"
}
}