EMC® Avamar® v6.1

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 12.10.2012
Valid until 19.04.2018
Scheme 🇨🇦 CA
Manufacturer EMC Corporation
Category Other Devices and Systems
Security level EAL2+, ALC_FLR.2

Heuristics summary ?

Certificate ID: 383-4-212

Certification report ?

Extracted keywords

Vendor
Microsoft

Security level
EAL 2+, EAL 2, EAL 2 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
383-4-212-CR
Evaluation facilities
EWA-Canada

Standards
ISO/IEC 17025:2005

File metadata

Title: EAL 2 Evaluation of <TOE name and version>
Author: User
Creation date: D:20121024072842-04'00'
Modification date: D:20121024072846-04'00'
Pages: 13
Creator: Acrobat PDFMaker 9.0 for Word
Producer: Acrobat Distiller 9.0.0 (Windows)

Frontpage

Certificate ID: 383-4-212-CR
Certification lab: CANADA

References

Security target ?

Extracted keywords

Protocols
TLS

Vendor
Microsoft

Security level
EAL2+, EAL2
Claims
O.AUDIT, O.ADMIN, O.AUTHENTICATE, O.PROTECT, O.DATA, O.TIMESTAMP, T.MASQUERADE, T.TAMPERING, T.UNAUTH, T.FAILED, A.INSTALL, A.TIMESTAMP, A.LOCATE, A.PROTECT, A.MANAGE, A.NOEVIL, A.SCONNECT, OE.TIME, OE.PROTECT, OE.PLATFORM, OE.SCONNECT, OE.MANAGE, OE.PHYSICAL, OE.SCONNCET
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FDP_ACC.2, FDP_ACF.1, FDP_ETC.1, FDP_ITC.1, FDP_ITT.1, FDP_SDI.2, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITT.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FIA_ATD.1, FIA_UAU.1, FIA_UAU.2, FIA_UID.2, FIA_USB.1, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.2.1, FIA_UID.2.1, FIA_USB, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_ITT.1, FPT_STM.1, FPT_ITT.1.1, FPT_STM.1.1

File metadata

Title: Security Target EMC® Avamar® v6.1
Subject: Avamar® v6.1
Author: Kathleen Moyer
Creation date: D:20120820113311-04'00'
Modification date: D:20121105105910-05'00'
Pages: 60
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

References

Heuristics ?

Certificate ID: 383-4-212

Extracted SARs

ASE_OBJ.2, ADV_TDS.1, ASE_TSS.1, ALC_FLR.2, ADV_ARC.1, ALC_DEL.1, ASE_REQ.2, ATE_FUN.1, ADV_FSP.2, AVA_VAN.2, ALC_CMC.2, ASE_CCL.1, ASE_ECD.1, AGD_OPE.1, ATE_COV.1, AGD_PRE.1, ALC_CMS.2, ASE_SPD.1, ATE_IND.2, ASE_INT.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2012-2291
C M N
HIGH 7.2 10.0 21.01.2013 21:55

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name EMC® Avamar® v6.1 was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:a:emc:avamar:6.1.100-402:-:*:*:*:vmware:*:*'], [2, 'cpe:2.3:a:emc:avamar:6.1.100-333:-:*:*:*:vmware:*:*']] values inserted.
  • 02.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[2, 'cpe:2.3:a:emc:avamar:6.1:*:*:*:*:*:*:*'], [3, 'cpe:2.3:a:emc:avamar:6.1.100-333:-:*:*:*:vmware:*:*'], [4, 'cpe:2.3:a:emc:avamar:6.1.100-402:-:*:*:*:vmware:*:*']] values inserted.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:a:emc:avamar:6.1.100-402:-:*:*:*:vmware:*:*'], [2, 'cpe:2.3:a:emc:avamar:6.1:-:*:*:*:vmware:*:*'], [3, 'cpe:2.3:a:emc:avamar:6.1.101-87:*:*:*:*:*:*:*']] values inserted.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[2, 'cpe:2.3:a:emc:avamar:6.1:*:*:*:*:*:*:*'], [4, 'cpe:2.3:a:emc:avamar:6.1.101-87:*:*:*:*:*:*:*']] values inserted.
  • 12.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:a:emc:avamar:6.1.101-87:*:*:*:*:*:*:*'], [3, 'cpe:2.3:a:emc:avamar:6.1:*:*:*:*:*:*:*'], [4, 'cpe:2.3:a:emc:avamar:6.1:-:*:*:*:vmware:*:*']] values inserted.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {'cert_id': '383-4-212-CR', 'cert_lab': 'CANADA'}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'383-4-212-CR': 1}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['6.1']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:emc:avamar:6.1:-:*:*:*:vmware:*:*', 'cpe:2.3:a:emc:avamar:6.1.100-333:-:*:*:*:vmware:*:*', 'cpe:2.3:a:emc:avamar:6.1.100-402:-:*:*:*:vmware:*:*', 'cpe:2.3:a:emc:avamar:6.1.101-87:*:*:*:*:*:*:*']}.
    • The cert_id property was set to 383-4-212-CR.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to ['CANADA'].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}]}}.
    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:emc:avamar_plugin:6.1:-:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2012-2291']} values added.
  • 18.05.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/383-4-212%20CR_v1.0e.pdf, code: 408'].

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}]} values discarded.
  • 19.05.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1216716, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 60, '/Author': 'Kathleen Moyer', '/CreationDate': "D:20120820113311-04'00'", '/Creator': 'Microsoft® Office Word 2007', '/ModDate': "D:20121105105910-05'00'", '/Producer': 'Microsoft® Office Word 2007', '/Subject': 'Avamar® v6.1', '/Title': 'Security Target EMC® Avamar® v6.1'}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'rules_vendor': {}, 'rules_cert_id': {}, 'rules_protection_profiles': {}, 'rules_technical_reports': {}, 'rules_device_id': {}, 'rules_os': {}, 'rules_standard_id': {}, 'rules_security_level': {'EAL2+': 3, 'EAL2': 2}, 'rules_security_assurance_components': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'ALC_FLR.2': 3, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1, 'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'AVA_VAN.2': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}, 'rules_security_functional_components': {'FAU_GEN.1': 16, 'FAU_GEN.2': 7, 'FAU_SAR.1': 8, 'FAU_SAR.2': 7, 'FAU_STG.1': 8, 'FAU_STG.3': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FDP_ACC.2': 20, 'FDP_ACF.1': 16, 'FDP_ETC.1': 6, 'FDP_ITC.1': 6, 'FDP_ITT.1': 6, 'FDP_SDI.2': 11, 'FDP_ACC.1': 26, 'FDP_ACC.2.1': 2, 'FDP_ACC.2.2': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITT.1.1': 1, 'FDP_SDI.1': 2, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 2, 'FIA_ATD.1': 9, 'FIA_UAU.1': 8, 'FIA_UAU.2': 7, 'FIA_UID.2': 11, 'FIA_USB.1': 4, 'FIA_UID.1': 17, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FMT_MOF.1': 10, 'FMT_MSA.1': 9, 'FMT_MSA.3': 13, 'FMT_MTD.1': 7, 'FMT_SMF.1': 12, 'FMT_SMR.1': 13, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FPT_ITT.1': 6, 'FPT_STM.1': 7, 'FPT_ITT.1.1': 1, 'FPT_STM.1.1': 1}, 'rules_cc_claims': {'O.AUDIT': 6, 'O.ADMIN': 10, 'O.AUTHENTICATE': 6, 'O.PROTECT': 7, 'O.DATA': 4, 'O.TIMESTAMP': 4, 'T.MASQUERADE': 2, 'T.TAMPERING': 2, 'T.UNAUTH': 2, 'T.FAILED': 2, 'A': 1, 'A.INSTALL': 2, 'A.TIMESTAMP': 2, 'A.LOCATE': 2, 'A.PROTECT': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.SCONNECT': 2, 'OE': 1, 'OE.TIME': 3, 'OE.PROTECT': 5, 'OE.PLATFORM': 3, 'OE.SCONNECT': 2, 'OE.MANAGE': 7, 'OE.PHYSICAL': 5, 'OE.SCONNCET': 1}, 'rules_javacard': {}, 'rules_javacard_api_consts': {}, 'rules_javacard_packages': {}, 'rules_crypto_algs': {}, 'rules_block_cipher_modes': {}, 'rules_ecc_curves': {}, 'rules_cplc': {}, 'rules_crypto_engines': {}, 'rules_crypto_libs': {}, 'rules_IC_data_groups': {}, 'rules_defenses': {}, 'rules_certification_process': {}, 'rules_vulnerabilities': {}, 'rules_other': {}}.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}]} values added.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'd7ed75166d3c0ecf11d71f22c0f7be19a3e2f6070c2e2a2e26bab7ef0a0ca9a2', 'st_pdf_hash': 'f642b0f3a5f3494e871d09fc9383dd91342d72448af0e133dbc2158d5b3fcd38', 'report_txt_hash': 'b089e1496d923ee46b676cf77d63206efc7c6a40bbad2112ada73d873f083a66', 'st_txt_hash': 'e1f6c2c4ac666a3e1495dea04dfd9f24f6627b1893d0e92d3243d4a09c2ef87b'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 2}, 'rules_randomness': {}, 'rules_tee': {'SE': 6}, 'rules_side_channels': {}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to False.
    • The errors property was set to ["Failed to read metadata of certs/reports/pdf/06c3fe87e62aedcb.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'", "Failed to read metadata of certs/reports/pdf/06c3fe87e62aedcb.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'"].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.corsec.com/', 'mailto:info@corsec.com', 'http://www.emc.com/']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'CA': {'383-4-212-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2+': 3, 'EAL 2': 4, 'EAL 2 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {'EWA': {'EWA-Canada': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2+': 3, 'EAL2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 3, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 16, 'FAU_GEN.2': 7, 'FAU_SAR.1': 8, 'FAU_SAR.2': 7, 'FAU_STG.1': 8, 'FAU_STG.3': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1}, 'FDP': {'FDP_ACC.2': 20, 'FDP_ACF.1': 16, 'FDP_ETC.1': 6, 'FDP_ITC.1': 6, 'FDP_ITT.1': 6, 'FDP_SDI.2': 11, 'FDP_ACC.1': 26, 'FDP_ACC.2.1': 2, 'FDP_ACC.2.2': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITT.1.1': 1, 'FDP_SDI.1': 2, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 2}, 'FIA': {'FIA_ATD.1': 9, 'FIA_UAU.1': 8, 'FIA_UAU.2': 7, 'FIA_UID.2': 11, 'FIA_USB.1': 4, 'FIA_UID.1': 17, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MOF.1': 10, 'FMT_MSA.1': 9, 'FMT_MSA.3': 13, 'FMT_MTD.1': 7, 'FMT_SMF.1': 12, 'FMT_SMR.1': 13, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_ITT.1': 6, 'FPT_STM.1': 7, 'FPT_ITT.1.1': 1, 'FPT_STM.1.1': 1}}, 'cc_claims': {'O': {'O.AUDIT': 6, 'O.ADMIN': 10, 'O.AUTHENTICATE': 6, 'O.PROTECT': 7, 'O.DATA': 4, 'O.TIMESTAMP': 4}, 'T': {'T.MASQUERADE': 2, 'T.TAMPERING': 2, 'T.UNAUTH': 2, 'T.FAILED': 2}, 'A': {'A': 1, 'A.INSTALL': 2, 'A.TIMESTAMP': 2, 'A.LOCATE': 2, 'A.PROTECT': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.SCONNECT': 2}, 'OE': {'OE': 1, 'OE.TIME': 3, 'OE.PROTECT': 5, 'OE.PLATFORM': 3, 'OE.SCONNECT': 2, 'OE.MANAGE': 7, 'OE.PHYSICAL': 5, 'OE.SCONNCET': 1}}, 'vendor': {'STMicroelectronics': {'STM': 9}, 'Microsoft': {'Microsoft': 8}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 6}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]}.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 67375, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/Author': 'User', '/CCEF': 'EWA-Canada', '/CR#20date': '12 October 2012', '/CR#20version': '1.0', '/Certificate#20date': '12 October 2012', '/CreationDate': "D:20121024072842-04'00'", '/Creator': 'Acrobat PDFMaker 9.0 for Word', '/Developer#20name': 'EMC', '/Document#20number': '383-4-212-CR', '/ETR#20title,#20version,#20date': 'Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of EMC® Avamar® v6.1, Version 0.3, 31 August 2012.', '/Evaluation#20completion#20date': '31 August 2012', '/ModDate': "D:20121024072846-04'00'", '/Producer': 'Acrobat Distiller 9.0.0 (Windows)', '/ST#20Title': 'EMC Corporation EMC® Avamar® v6.1 Security Target', '/ST#20date': '20 August 2012', '/ST#20version': 'Version 1.0', '/SourceModified': 'D:20121024112805', '/Sponsor': 'EMC', '/TOE#20Version': '6.1', '/TOE#20name#20and#20version': 'EMC® Avamar® v6.1', '/TOE#20short#20name': 'Avamar® v6.1', '/Title': 'EAL 2 Evaluation of <TOE name and version>', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CANADA'].
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '383-4-212 CR_v1.0e.pdf', 'st_filename': 'emc-avamar-v61-sec-eng.pdf'}.
    • The report_keywords property was updated, with the {'tee_name': {}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 4}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 13, 'FAU_SAR.1': 7, 'FAU_STG.1': 7, 'FAU_STG.3': 7}}, 'FDP': {'__update__': {'FDP_ACC.1': 23}}, 'FIA': {'__insert__': {'FIA_USB': 1}, '__update__': {'FIA_ATD.1': 8, 'FIA_USB.1': 8, 'FIA_UID.1': 15}}, 'FMT': {'__update__': {'FMT_SMR.1': 10}}, 'FPT': {'__update__': {'FPT_STM.1': 8}}}}, 'cc_claims': {'__update__': {'A': {'__delete__': ['A']}, 'OE': {'__delete__': ['OE']}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'tee_name': {}} data.

    The computed heuristics were updated.

    • The cert_id property was set to 383-4-212.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:emc:avamar:6.1.100-333:-:*:*:*:vmware:*:*', 'cpe:2.3:a:emc:avamar:6.1.100-402:-:*:*:*:vmware:*:*', 'cpe:2.3:a:emc:avamar:6.1:-:*:*:*:vmware:*:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2013-0945', 'CVE-2012-4610', 'CVE-2016-0906', 'CVE-2014-4623']} values discarded.
  • 16.11.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'/CR date': '12 October 2012', '/CR version': '1.0', '/Certificate date': '12 October 2012', '/Developer name': 'EMC', '/Document number': '383-4-212-CR', '/ETR title, version, date': 'Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of EMC® Avamar® v6.1, Version 0.3, 31 August 2012.', '/Evaluation completion date': '31 August 2012', '/ST Title': 'EMC Corporation EMC® Avamar® v6.1 Security Target', '/ST date': '20 August 2012', '/ST version': 'Version 1.0', '/TOE Version': '6.1', '/TOE name and version': 'EMC® Avamar® v6.1', '/TOE short name': 'Avamar® v6.1'} values inserted.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "06c3fe87e62aedcb",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "383-4-212",
    "cert_lab": [
      "CANADA"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:emc:avamar_plugin:6.1:-:*:*:*:*:*:*"
      ]
    },
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.1"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2012-2291"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "EMC Corporation",
  "manufacturer_web": "https://www.emc.com/",
  "name": "EMC\u00ae Avamar\u00ae v6.1",
  "not_valid_after": "2018-04-19",
  "not_valid_before": "2012-10-12",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "383-4-212 CR_v1.0e.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {
        "cert_id": "383-4-212-CR",
        "cert_lab": "CANADA"
      },
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "383-4-212-CR": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 4,
          "EAL 2 augmented": 2,
          "EAL 2+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA-Canada": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 17025:2005": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "User",
      "/CCEF": "EWA-Canada",
      "/CR date": "12 October 2012",
      "/CR version": "1.0",
      "/Certificate date": "12 October 2012",
      "/CreationDate": "D:20121024072842-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 9.0 for Word",
      "/Developer name": "EMC",
      "/Document number": "383-4-212-CR",
      "/ETR title, version, date": "Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of EMC\u00ae Avamar\u00ae v6.1, Version 0.3, 31 August 2012.",
      "/Evaluation completion date": "31 August 2012",
      "/ModDate": "D:20121024072846-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.0.0 (Windows)",
      "/ST Title": "EMC Corporation EMC\u00ae Avamar\u00ae v6.1 Security Target",
      "/ST date": "20 August 2012",
      "/ST version": "Version 1.0",
      "/SourceModified": "D:20121024112805",
      "/Sponsor": "EMC",
      "/TOE Version": "6.1",
      "/TOE name and version": "EMC\u00ae Avamar\u00ae v6.1",
      "/TOE short name": "Avamar\u00ae v6.1",
      "/Title": "EAL 2 Evaluation of \u003cTOE name and version\u003e",
      "pdf_file_size_bytes": 67375,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "emc-avamar-v61-sec-eng.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.INSTALL": 2,
          "A.LOCATE": 2,
          "A.MANAGE": 2,
          "A.NOEVIL": 2,
          "A.PROTECT": 2,
          "A.SCONNECT": 2,
          "A.TIMESTAMP": 2
        },
        "O": {
          "O.ADMIN": 10,
          "O.AUDIT": 6,
          "O.AUTHENTICATE": 6,
          "O.DATA": 4,
          "O.PROTECT": 7,
          "O.TIMESTAMP": 4
        },
        "OE": {
          "OE.MANAGE": 7,
          "OE.PHYSICAL": 5,
          "OE.PLATFORM": 3,
          "OE.PROTECT": 5,
          "OE.SCONNCET": 1,
          "OE.SCONNECT": 2,
          "OE.TIME": 3
        },
        "T": {
          "T.FAILED": 2,
          "T.MASQUERADE": 2,
          "T.TAMPERING": 2,
          "T.UNAUTH": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 4
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL2+": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 13,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 7,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 7,
          "FAU_SAR.2.1": 1,
          "FAU_STG.1": 7,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 7,
          "FAU_STG.3.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 23,
          "FDP_ACC.2": 20,
          "FDP_ACC.2.1": 2,
          "FDP_ACC.2.2": 2,
          "FDP_ACF.1": 16,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_ETC.1": 6,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_ITC.1": 6,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITT.1": 6,
          "FDP_ITT.1.1": 1,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 11,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2
        },
        "FIA": {
          "FIA_ATD.1": 8,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.1": 8,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 15,
          "FIA_UID.2": 11,
          "FIA_UID.2.1": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 8
        },
        "FMT": {
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 9,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 13,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT.1": 6,
          "FPT_ITT.1.1": 1,
          "FPT_STM.1": 8,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 8
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Kathleen Moyer",
      "/CreationDate": "D:20120820113311-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20121105105910-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Avamar\u00ae v6.1",
      "/Title": "Security Target EMC\u00ae Avamar\u00ae v6.1",
      "pdf_file_size_bytes": 1216716,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.emc.com/",
          "http://www.corsec.com/",
          "mailto:info@corsec.com"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 60
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/383-4-212%20CR_v1.0e.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/emc-avamar-v61-sec-eng.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "d7ed75166d3c0ecf11d71f22c0f7be19a3e2f6070c2e2a2e26bab7ef0a0ca9a2",
    "report_txt_hash": "b089e1496d923ee46b676cf77d63206efc7c6a40bbad2112ada73d873f083a66",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "f642b0f3a5f3494e871d09fc9383dd91342d72448af0e133dbc2158d5b3fcd38",
    "st_txt_hash": "e1f6c2c4ac666a3e1495dea04dfd9f24f6627b1893d0e92d3243d4a09c2ef87b"
  },
  "status": "archived"
}