Crunchy Certified PostgreSQL 12.5
CSV information ?
Status | active |
---|---|
Valid from | 16.03.2021 |
Valid until | 16.03.2026 |
Scheme | 🇨🇦 CA |
Manufacturer | Crunchy Data Solutions Inc. |
Category | Databases |
Security level | EAL2+, ALC_FLR.2 |
Protection profiles |
Heuristics summary ?
Certificate ?
Extracted keywords
Certificates
516-LSSEvaluation facilities
Lightship SecurityFile metadata
Title: | cyber-centre-product-evaluation-certificate-e-bg |
---|---|
Creation date: | D:20190122115136-04'00' |
Modification date: | D:20210325160326-05'00' |
Pages: | 1 |
Creator: | Adobe Illustrator CC 22.0 (Windows) |
Producer: | Adobe PDF library 15.00 |
Certification report ?
Extracted keywords
Protocols
SSLSecurity level
EAL 2+Security Assurance Requirements (SAR)
ALC_FLR.2Certificates
516-LSSEvaluation facilities
Lightship SecurityStandards
ISO/IEC 17025File metadata
Author: | White, Debra E. |
---|---|
Creation date: | D:20210326143039-04'00' |
Modification date: | D:20210326143039-04'00' |
Pages: | 16 |
Creator: | Microsoft® Word for Microsoft 365 |
Producer: | Microsoft® Word for Microsoft 365 |
References
No references.
Security target ?
Extracted keywords
Hash functions
MD5Protocols
SSLLibraries
OpenSSLSecurity level
EAL2, EAL2 augmentedClaims
O.ADMIN_ROLE, O.AUDIT_GENERATION, O.DISCRETIONARY_ACCESS, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORMATION, O.TOE_ACCESS, O.TOEACCESS, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED_SYSTEMSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FIA_USB.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1Certification process
Out of Scope, Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide, methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is, platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional DependenciesCertification process
Out of Scope, Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide, methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is, platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional DependenciesStandards
RFC 1413, RFC 2743, RFC 1964, RFC 7677, RFC 1321, RFC 4510File metadata
Author: | Paul Laurence |
---|---|
Creation date: | D:20210316110349-04'00' |
Modification date: | D:20210316110349-04'00' |
Pages: | 79 |
Creator: | Microsoft® Word for Microsoft 365 |
Producer: | Microsoft® Word for Microsoft 365 |
References
No references.
Heuristics ?
Extracted SARs
ALC_FLR.2, AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, ALC_CMS.2, ALC_CMC.2, ASE_TSS.1, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ALC_DEL.1, ASE_ECD.1, ATE_FUN.1, ATE_COV.1, ASE_SPD.1, ADV_TDS.1, ATE_IND.2, ADV_ARC.1, ADV_FSP.2Scheme data ?
Product | Crunchy Certified PostgreSQL 12.5 | |
---|---|---|
Vendor | Crunchy Data Solutions, Inc. | |
Level | DBMS PP Base Package, V2.12 | |
Certification Date | 2021-03-16 |
References ?
No references are available for this certificate.
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '522a896a3bd1386b7347ed32abf58950d4dbf8cac2fce7b48ee1205116621b69', 'txt_hash': '8c9c3ab3dfce2272e80a885de7bc3479b5f45d8fd090ae68ccf084fa92cfbdb5'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8512df6f67ee2f8aa98cb383f2e3ae76577483fe8cc6ea43d21fc9f3e22fa42a', 'txt_hash': 'ead1b738c0d0b410749550f96bae9aabdb5e7114f4dd98f65d622904077031d5'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '62dcccf374de788629d4d52afdf5702a3c275fe34f5b9ff8a92df0ac185ffc9d', 'txt_hash': 'da9aa84738e5ea013feef3cac77a0af37e0c6c9ddeb93d3d4ac5f80fe7448b89'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': {'pdf_file_size_bytes': 1640422, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20210325160326-05'00'", '/Producer': 'Adobe PDF library 15.00', '/Title': 'cyber-centre-product-evaluation-certificate-e-bg', '/Creator': 'Adobe Illustrator CC 22.0 (Windows)', '/CreationDate': "D:20190122115136-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'CA': {'516-LSS': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Lightship': {'Lightship Security': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '516-LSS CT no sig Eng.pdf'}
. - The report_frontpage property was set to
{'CA': {}}
. - The st_frontpage property was set to
None
.
- The following values were inserted:
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
.
- The following values were inserted:
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'product': 'Crunchy Certified PostgreSQL 12.5', 'vendor': 'Crunchy Data Solutions, Inc.', 'level': 'DBMS PP Base Package, V2.12', 'certification_date': '2021-03-16'}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/516-LSS%20CT%20no%20sig%20Eng.pdf
.
The manufacturer_web was updated.
- The new value is
https://crunchydata.com/
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}
.
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/516%20LSS%20CR.pdf, code: 408']
.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
None
.
The manufacturer_web was updated.
- The new value is
None
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'DBMS_PPV2.12', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '516 LSS CR.pdf', 'st_filename': 'Security Target - Crunchy Certified PostgreSQL 12 - v1.8 - 515-LSS.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'CA': {'516-LSS': 1}}, 'crypto_protocol': {'__update__': {'TLS': {'__delete__': ['TLS']}}}, 'tee_name': {}}
data. - The st_keywords property was updated, with the
{'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 4, 'FAU_GEN.2': 4, 'FAU_GEN.1.2': 2}}, 'FDP': {'__update__': {'FDP_ACF.1': 6, 'FDP_RIP.1': 6, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.4': 2}}, 'FIA': {'__update__': {'FIA_USB.1': 5, 'FIA_ATD.1': 10, 'FIA_UAU.1': 4, 'FIA_UAU.1.2': 2, 'FIA_UID.1.2': 2}}, 'FMT': {'__update__': {'FMT_MSA.1': 6, 'FMT_MTD.1': 5, 'FMT_SMR.1': 7, 'FMT_MSA.3.2': 2, 'FMT_SMF.1.1': 2}}, 'FTA': {'__update__': {'FTA_TSE.1': 4, 'FTA_MCS.1.2': 2}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 5}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'RFC': {'__insert__': {'RFC 2743': 1, 'RFC 1964': 1, 'RFC 4510': 1}, '__update__': {'RFC 1413': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide': 1, 'methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is': 1}, '__update__': {'Out of Scope': 2}, '__delete__': ['. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE', 'ostgreSQL Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide', 'entication methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is']}}}}
data.
The computed heuristics were updated.
- The cert_id property was set to
516-LSS
.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:contact@cyber.gc.ca', 'https://www.pgaudit.org/#section_three', 'https://postgis.net/documentation/', 'https://jdbc.postgresql.org/', 'https://www.postgresql.org/support/security/', 'https://www.packetstormsecurity.org/', 'https://www.cvedetails.com/', 'https://www.postgresql.org/docs/9.5/libpq.html', 'http://www.google.com/', 'https://www.crunchydata.com/', 'http://www.kb.cert.org/vuls/', 'http://nvd.nist.gov/', 'http://cve.mitre.org/']}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2+': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Lightship': {'Lightship Security': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 5, 'FAU_GEN.2': 5, 'FAU_SEL.1': 7, 'FAU_GEN.1.1': 3, 'FAU_GEN.1.2': 3, 'FAU_GEN.2.1': 3, 'FAU_SEL.1.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 9, 'FDP_RIP.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 3, 'FDP_ACF.1.4': 3, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_USB.1': 4, 'FIA_ATD.1': 9, 'FIA_UAU.1': 5, 'FIA_UID.1': 5, 'FIA_ATD.1.1': 3, 'FIA_UAU.1.1': 3, 'FIA_UAU.1.2': 3, 'FIA_UID.1.1': 3, 'FIA_UID.1.2': 3}, 'FMT': {'FMT_MOF.1': 8, 'FMT_MSA.1': 8, 'FMT_MSA.3': 5, 'FMT_MTD.1': 6, 'FMT_REV.1': 13, 'FMT_SMF.1': 5, 'FMT_SMR.1': 8, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 3, 'FMT_MTD.1.1': 3, 'FMT_REV.1.1': 7, 'FMT_REV.1.2': 8, 'FMT_SMF.1.1': 3, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2}, 'FPT': {'FPT_TRC.1': 7, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1}, 'FTA': {'FTA_MCS.1': 5, 'FTA_TSE.1': 5, 'FTA_MCS.1.1': 3, 'FTA_MCS.1.2': 3, 'FTA_TSE.1.1': 3}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 8, 'O.AUDIT_GENERATION': 6, 'O.DISCRETIONARY_ACCESS': 6, 'O.MANAGE': 10, 'O.MEDIATE': 8, 'O.RESIDUAL_INFORMATION': 8, 'O.TOE_ACCESS': 17, 'O.TOEACCESS': 1}, 'T': {'T.ACCESS_TSFDATA': 2, 'T.ACCESS_TSFFUNC': 2, 'T.IA_MASQUERADE': 3, 'T.IA_USER': 2, 'T.RESIDUAL_DATA': 2, 'T.TSF_COMPROMISE': 3, 'T.UNAUTHORIZED_ACCESS': 3}, 'A': {'A.PHYSICAL': 2, 'A.AUTHUSER': 2, 'A.MANAGE': 2, 'A.TRAINEDUSER': 2, 'A.NO_GENERAL_PURPOSE': 2, 'A.SUPPORT': 2, 'A.CONNECT': 2}, 'OE': {'OE.ADMIN': 11, 'OE.INFO_PROTECT': 19, 'OE.NO_GENERAL_PURPOSE': 7, 'OE.PHYSICAL': 7, 'OE.IT_REMOTE': 9, 'OE.IT_TRUSTED_SYSTEM': 9}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 3}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 16}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 1413': 1, 'RFC 7677': 4, 'RFC 1321': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'Out of Scope': 1, '. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE': 1, 'ostgreSQL Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide': 1, 'entication methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is': 1, 'platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional Dependencies': 1}}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '522a896a3bd1386b7347ed32abf58950d4dbf8cac2fce7b48ee1205116621b69', 'st_pdf_hash': '8512df6f67ee2f8aa98cb383f2e3ae76577483fe8cc6ea43d21fc9f3e22fa42a', 'report_txt_hash': '8c9c3ab3dfce2272e80a885de7bc3479b5f45d8fd090ae68ccf084fa92cfbdb5', 'st_txt_hash': 'ead1b738c0d0b410749550f96bae9aabdb5e7114f4dd98f65d622904077031d5'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 1, 'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'MD5': 4}, 'rules_crypto_schemes': {'SSL': 11}, 'rules_randomness': {}, 'rules_tee': {'SE': 16}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['12.5']}
.
- The report_frontpage property was updated, with the
-
01.02.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}
.
- The new value is
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Crunchy Certified PostgreSQL 12.5 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Databases",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/516-LSS%20CT%20no%20sig%20Eng.pdf",
"dgst": "10339846e519597c",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "516-LSS",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"12.5"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"certification_date": "2021-03-16",
"level": "DBMS PP Base Package, V2.12",
"product": "Crunchy Certified PostgreSQL 12.5",
"vendor": "Crunchy Data Solutions, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Crunchy Data Solutions Inc.",
"manufacturer_web": "https://crunchydata.com/",
"name": "Crunchy Certified PostgreSQL 12.5",
"not_valid_after": "2026-03-16",
"not_valid_before": "2021-03-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "516-LSS CT no sig Eng.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"516-LSS": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Lightship": {
"Lightship Security": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20190122115136-04\u002700\u0027",
"/Creator": "Adobe Illustrator CC 22.0 (Windows)",
"/ModDate": "D:20210325160326-05\u002700\u0027",
"/Producer": "Adobe PDF library 15.00",
"/Title": "cyber-centre-product-evaluation-certificate-e-bg",
"pdf_file_size_bytes": 1640422,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "516 LSS CR.pdf",
"report_frontpage": {
"CA": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"516-LSS": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Lightship": {
"Lightship Security": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "White, Debra E.",
"/CreationDate": "D:20210326143039-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20210326143039-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 596553,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.crunchydata.com/",
"https://www.postgresql.org/docs/9.5/libpq.html",
"https://jdbc.postgresql.org/",
"https://www.cvedetails.com/",
"https://www.pgaudit.org/#section_three",
"mailto:contact@cyber.gc.ca",
"http://nvd.nist.gov/",
"http://www.google.com/",
"https://www.postgresql.org/support/security/",
"http://cve.mitre.org/",
"https://www.packetstormsecurity.org/",
"https://postgis.net/documentation/",
"http://www.kb.cert.org/vuls/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "Security Target - Crunchy Certified PostgreSQL 12 - v1.8 - 515-LSS.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUTHUSER": 2,
"A.CONNECT": 2,
"A.MANAGE": 2,
"A.NO_GENERAL_PURPOSE": 2,
"A.PHYSICAL": 2,
"A.SUPPORT": 2,
"A.TRAINEDUSER": 2
},
"O": {
"O.ADMIN_ROLE": 8,
"O.AUDIT_GENERATION": 6,
"O.DISCRETIONARY_ACCESS": 6,
"O.MANAGE": 10,
"O.MEDIATE": 8,
"O.RESIDUAL_INFORMATION": 8,
"O.TOEACCESS": 1,
"O.TOE_ACCESS": 17
},
"OE": {
"OE.ADMIN": 11,
"OE.INFO_PROTECT": 19,
"OE.IT_REMOTE": 9,
"OE.IT_TRUSTED_SYSTEM": 9,
"OE.NO_GENERAL_PURPOSE": 7,
"OE.PHYSICAL": 7
},
"T": {
"T.ACCESS_TSFDATA": 2,
"T.ACCESS_TSFFUNC": 2,
"T.IA_MASQUERADE": 3,
"T.IA_USER": 2,
"T.RESIDUAL_DATA": 2,
"T.TSF_COMPROMISE": 3,
"T.UNAUTHORIZED_ACCESS": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3,
"EAL2 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 4,
"FAU_GEN.1.1": 3,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 3,
"FAU_SEL.1": 7,
"FAU_SEL.1.1": 1
},
"FDP": {
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 2,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 3,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 3,
"FIA_UAU.1.2": 2,
"FIA_UID.1": 5,
"FIA_UID.1.1": 3,
"FIA_UID.1.2": 2,
"FIA_USB.1": 5
},
"FMT": {
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 5,
"FMT_MSA.3.1": 3,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 3,
"FMT_REV.1": 13,
"FMT_REV.1.1": 7,
"FMT_REV.1.2": 8,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 2
},
"FPT": {
"FPT_TRC.1": 7,
"FPT_TRC.1.1": 1,
"FPT_TRC.1.2": 1
},
"FTA": {
"FTA_MCS.1": 5,
"FTA_MCS.1.1": 3,
"FTA_MCS.1.2": 2,
"FTA_TSE.1": 4,
"FTA_TSE.1.1": 3
}
},
"certification_process": {
"OutOfScope": {
"Audit Extension \u2022 PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide": 1,
"Out of Scope": 2,
"methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 \u201cTrust\u201d authentication option (not in TOE) When the trust authentication option is": 1,
"platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: \u2022 Authenticator servers, if configured; and \u2022 Terminal emulator 1.5.9.4.3 Functional Dependencies": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 3
}
},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 5
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 1321": 4,
"RFC 1413": 2,
"RFC 1964": 1,
"RFC 2743": 1,
"RFC 4510": 1,
"RFC 7677": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Paul Laurence",
"/CreationDate": "D:20210316110349-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20210316110349-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 1146452,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 79
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL2+",
"pp_ids": {
"_type": "Set",
"elements": [
"DBMS_PPV2.12"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf",
"pp_name": "Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/516%20LSS%20CR.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/Security%20Target%20-%20Crunchy%20Certified%20PostgreSQL%2012%20-%20v1.8%20-%20515-LSS.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "62dcccf374de788629d4d52afdf5702a3c275fe34f5b9ff8a92df0ac185ffc9d",
"txt_hash": "da9aa84738e5ea013feef3cac77a0af37e0c6c9ddeb93d3d4ac5f80fe7448b89"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "522a896a3bd1386b7347ed32abf58950d4dbf8cac2fce7b48ee1205116621b69",
"txt_hash": "8c9c3ab3dfce2272e80a885de7bc3479b5f45d8fd090ae68ccf084fa92cfbdb5"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8512df6f67ee2f8aa98cb383f2e3ae76577483fe8cc6ea43d21fc9f3e22fa42a",
"txt_hash": "ead1b738c0d0b410749550f96bae9aabdb5e7114f4dd98f65d622904077031d5"
}
},
"status": "active"
}