Crunchy Certified PostgreSQL 12.5

CSV information ?

Status active
Valid from 16.03.2021
Valid until 16.03.2026
Scheme 🇨🇦 CA
Manufacturer Crunchy Data Solutions Inc.
Category Databases
Security level EAL2+, ALC_FLR.2
Protection profiles

Heuristics summary ?

Certificate ID: 516-LSS

Certificate ?

Extracted keywords

Certificates
516-LSS
Evaluation facilities
Lightship Security

File metadata

Title: cyber-centre-product-evaluation-certificate-e-bg
Creation date: D:20190122115136-04'00'
Modification date: D:20210325160326-05'00'
Pages: 1
Creator: Adobe Illustrator CC 22.0 (Windows)
Producer: Adobe PDF library 15.00

Certification report ?

Extracted keywords

Protocols
SSL

Security level
EAL 2+
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
516-LSS
Evaluation facilities
Lightship Security

Standards
ISO/IEC 17025

File metadata

Author: White, Debra E.
Creation date: D:20210326143039-04'00'
Modification date: D:20210326143039-04'00'
Pages: 16
Creator: Microsoft® Word for Microsoft 365
Producer: Microsoft® Word for Microsoft 365

References

No references.

Security target ?

Extracted keywords

Hash functions
MD5
Protocols
SSL
Libraries
OpenSSL

Security level
EAL2, EAL2 augmented
Claims
O.ADMIN_ROLE, O.AUDIT_GENERATION, O.DISCRETIONARY_ACCESS, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORMATION, O.TOE_ACCESS, O.TOEACCESS, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED_SYSTEM
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FIA_USB.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1
Certification process
Out of Scope, Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide, methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is, platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional Dependencies

Certification process
Out of Scope, Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide, methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is, platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional Dependencies

Standards
RFC 1413, RFC 2743, RFC 1964, RFC 7677, RFC 1321, RFC 4510

File metadata

Author: Paul Laurence
Creation date: D:20210316110349-04'00'
Modification date: D:20210316110349-04'00'
Pages: 79
Creator: Microsoft® Word for Microsoft 365
Producer: Microsoft® Word for Microsoft 365

References

No references.

Heuristics ?

Certificate ID: 516-LSS

Extracted SARs

ALC_FLR.2, AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, ALC_CMS.2, ALC_CMC.2, ASE_TSS.1, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ALC_DEL.1, ASE_ECD.1, ATE_FUN.1, ATE_COV.1, ASE_SPD.1, ADV_TDS.1, ATE_IND.2, ADV_ARC.1, ADV_FSP.2

Scheme data ?

Product Crunchy Certified PostgreSQL 12.5
Vendor Crunchy Data Solutions, Inc.
Level DBMS PP Base Package, V2.12
Certification Date 2021-03-16

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '522a896a3bd1386b7347ed32abf58950d4dbf8cac2fce7b48ee1205116621b69', 'txt_hash': '8c9c3ab3dfce2272e80a885de7bc3479b5f45d8fd090ae68ccf084fa92cfbdb5'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8512df6f67ee2f8aa98cb383f2e3ae76577483fe8cc6ea43d21fc9f3e22fa42a', 'txt_hash': 'ead1b738c0d0b410749550f96bae9aabdb5e7114f4dd98f65d622904077031d5'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '62dcccf374de788629d4d52afdf5702a3c275fe34f5b9ff8a92df0ac185ffc9d', 'txt_hash': 'da9aa84738e5ea013feef3cac77a0af37e0c6c9ddeb93d3d4ac5f80fe7448b89'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 1640422, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20210325160326-05'00'", '/Producer': 'Adobe PDF library 15.00', '/Title': 'cyber-centre-product-evaluation-certificate-e-bg', '/Creator': 'Adobe Illustrator CC 22.0 (Windows)', '/CreationDate': "D:20190122115136-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'CA': {'516-LSS': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Lightship': {'Lightship Security': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '516-LSS CT no sig Eng.pdf'}.
    • The report_frontpage property was set to {'CA': {}}.
    • The st_frontpage property was set to None.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'Crunchy Certified PostgreSQL 12.5', 'vendor': 'Crunchy Data Solutions, Inc.', 'level': 'DBMS PP Base Package, V2.12', 'certification_date': '2021-03-16'}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/516-LSS%20CT%20no%20sig%20Eng.pdf.

    The manufacturer_web was updated.

    • The new value is https://crunchydata.com/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}.

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/516%20LSS%20CR.pdf, code: 408'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'DBMS_PPV2.12', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '516 LSS CR.pdf', 'st_filename': 'Security Target - Crunchy Certified PostgreSQL 12 - v1.8 - 515-LSS.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'CA': {'516-LSS': 1}}, 'crypto_protocol': {'__update__': {'TLS': {'__delete__': ['TLS']}}}, 'tee_name': {}} data.
    • The st_keywords property was updated, with the {'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 4, 'FAU_GEN.2': 4, 'FAU_GEN.1.2': 2}}, 'FDP': {'__update__': {'FDP_ACF.1': 6, 'FDP_RIP.1': 6, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.4': 2}}, 'FIA': {'__update__': {'FIA_USB.1': 5, 'FIA_ATD.1': 10, 'FIA_UAU.1': 4, 'FIA_UAU.1.2': 2, 'FIA_UID.1.2': 2}}, 'FMT': {'__update__': {'FMT_MSA.1': 6, 'FMT_MTD.1': 5, 'FMT_SMR.1': 7, 'FMT_MSA.3.2': 2, 'FMT_SMF.1.1': 2}}, 'FTA': {'__update__': {'FTA_TSE.1': 4, 'FTA_MCS.1.2': 2}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 5}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'RFC': {'__insert__': {'RFC 2743': 1, 'RFC 1964': 1, 'RFC 4510': 1}, '__update__': {'RFC 1413': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide': 1, 'methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is': 1}, '__update__': {'Out of Scope': 2}, '__delete__': ['. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE', 'ostgreSQL Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide', 'entication methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is']}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to 516-LSS.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:contact@cyber.gc.ca', 'https://www.pgaudit.org/#section_three', 'https://postgis.net/documentation/', 'https://jdbc.postgresql.org/', 'https://www.postgresql.org/support/security/', 'https://www.packetstormsecurity.org/', 'https://www.cvedetails.com/', 'https://www.postgresql.org/docs/9.5/libpq.html', 'http://www.google.com/', 'https://www.crunchydata.com/', 'http://www.kb.cert.org/vuls/', 'http://nvd.nist.gov/', 'http://cve.mitre.org/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2+': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Lightship': {'Lightship Security': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 5, 'FAU_GEN.2': 5, 'FAU_SEL.1': 7, 'FAU_GEN.1.1': 3, 'FAU_GEN.1.2': 3, 'FAU_GEN.2.1': 3, 'FAU_SEL.1.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 9, 'FDP_RIP.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 3, 'FDP_ACF.1.4': 3, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_USB.1': 4, 'FIA_ATD.1': 9, 'FIA_UAU.1': 5, 'FIA_UID.1': 5, 'FIA_ATD.1.1': 3, 'FIA_UAU.1.1': 3, 'FIA_UAU.1.2': 3, 'FIA_UID.1.1': 3, 'FIA_UID.1.2': 3}, 'FMT': {'FMT_MOF.1': 8, 'FMT_MSA.1': 8, 'FMT_MSA.3': 5, 'FMT_MTD.1': 6, 'FMT_REV.1': 13, 'FMT_SMF.1': 5, 'FMT_SMR.1': 8, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 3, 'FMT_MTD.1.1': 3, 'FMT_REV.1.1': 7, 'FMT_REV.1.2': 8, 'FMT_SMF.1.1': 3, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2}, 'FPT': {'FPT_TRC.1': 7, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1}, 'FTA': {'FTA_MCS.1': 5, 'FTA_TSE.1': 5, 'FTA_MCS.1.1': 3, 'FTA_MCS.1.2': 3, 'FTA_TSE.1.1': 3}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 8, 'O.AUDIT_GENERATION': 6, 'O.DISCRETIONARY_ACCESS': 6, 'O.MANAGE': 10, 'O.MEDIATE': 8, 'O.RESIDUAL_INFORMATION': 8, 'O.TOE_ACCESS': 17, 'O.TOEACCESS': 1}, 'T': {'T.ACCESS_TSFDATA': 2, 'T.ACCESS_TSFFUNC': 2, 'T.IA_MASQUERADE': 3, 'T.IA_USER': 2, 'T.RESIDUAL_DATA': 2, 'T.TSF_COMPROMISE': 3, 'T.UNAUTHORIZED_ACCESS': 3}, 'A': {'A.PHYSICAL': 2, 'A.AUTHUSER': 2, 'A.MANAGE': 2, 'A.TRAINEDUSER': 2, 'A.NO_GENERAL_PURPOSE': 2, 'A.SUPPORT': 2, 'A.CONNECT': 2}, 'OE': {'OE.ADMIN': 11, 'OE.INFO_PROTECT': 19, 'OE.NO_GENERAL_PURPOSE': 7, 'OE.PHYSICAL': 7, 'OE.IT_REMOTE': 9, 'OE.IT_TRUSTED_SYSTEM': 9}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 3}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 16}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 1413': 1, 'RFC 7677': 4, 'RFC 1321': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'Out of Scope': 1, '. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE': 1, 'ostgreSQL Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide': 1, 'entication methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is': 1, 'platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional Dependencies': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '522a896a3bd1386b7347ed32abf58950d4dbf8cac2fce7b48ee1205116621b69', 'st_pdf_hash': '8512df6f67ee2f8aa98cb383f2e3ae76577483fe8cc6ea43d21fc9f3e22fa42a', 'report_txt_hash': '8c9c3ab3dfce2272e80a885de7bc3479b5f45d8fd090ae68ccf084fa92cfbdb5', 'st_txt_hash': 'ead1b738c0d0b410749550f96bae9aabdb5e7114f4dd98f65d622904077031d5'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 1, 'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'MD5': 4}, 'rules_crypto_schemes': {'SSL': 11}, 'rules_randomness': {}, 'rules_tee': {'SE': 16}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['12.5']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Crunchy Certified PostgreSQL 12.5 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Databases",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/516-LSS%20CT%20no%20sig%20Eng.pdf",
  "dgst": "10339846e519597c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "516-LSS",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "12.5"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "certification_date": "2021-03-16",
      "level": "DBMS PP Base Package, V2.12",
      "product": "Crunchy Certified PostgreSQL 12.5",
      "vendor": "Crunchy Data Solutions, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Crunchy Data Solutions Inc.",
  "manufacturer_web": "https://crunchydata.com/",
  "name": "Crunchy Certified PostgreSQL 12.5",
  "not_valid_after": "2026-03-16",
  "not_valid_before": "2021-03-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "516-LSS CT no sig Eng.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "516-LSS": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Lightship": {
          "Lightship Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20190122115136-04\u002700\u0027",
      "/Creator": "Adobe Illustrator CC 22.0 (Windows)",
      "/ModDate": "D:20210325160326-05\u002700\u0027",
      "/Producer": "Adobe PDF library 15.00",
      "/Title": "cyber-centre-product-evaluation-certificate-e-bg",
      "pdf_file_size_bytes": 1640422,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "516 LSS CR.pdf",
    "report_frontpage": {
      "CA": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "516-LSS": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Lightship": {
          "Lightship Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "White, Debra E.",
      "/CreationDate": "D:20210326143039-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20210326143039-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 596553,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.crunchydata.com/",
          "https://www.postgresql.org/docs/9.5/libpq.html",
          "https://jdbc.postgresql.org/",
          "https://www.cvedetails.com/",
          "https://www.pgaudit.org/#section_three",
          "mailto:contact@cyber.gc.ca",
          "http://nvd.nist.gov/",
          "http://www.google.com/",
          "https://www.postgresql.org/support/security/",
          "http://cve.mitre.org/",
          "https://www.packetstormsecurity.org/",
          "https://postgis.net/documentation/",
          "http://www.kb.cert.org/vuls/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "Security Target - Crunchy Certified PostgreSQL 12 - v1.8 - 515-LSS.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.AUTHUSER": 2,
          "A.CONNECT": 2,
          "A.MANAGE": 2,
          "A.NO_GENERAL_PURPOSE": 2,
          "A.PHYSICAL": 2,
          "A.SUPPORT": 2,
          "A.TRAINEDUSER": 2
        },
        "O": {
          "O.ADMIN_ROLE": 8,
          "O.AUDIT_GENERATION": 6,
          "O.DISCRETIONARY_ACCESS": 6,
          "O.MANAGE": 10,
          "O.MEDIATE": 8,
          "O.RESIDUAL_INFORMATION": 8,
          "O.TOEACCESS": 1,
          "O.TOE_ACCESS": 17
        },
        "OE": {
          "OE.ADMIN": 11,
          "OE.INFO_PROTECT": 19,
          "OE.IT_REMOTE": 9,
          "OE.IT_TRUSTED_SYSTEM": 9,
          "OE.NO_GENERAL_PURPOSE": 7,
          "OE.PHYSICAL": 7
        },
        "T": {
          "T.ACCESS_TSFDATA": 2,
          "T.ACCESS_TSFFUNC": 2,
          "T.IA_MASQUERADE": 3,
          "T.IA_USER": 2,
          "T.RESIDUAL_DATA": 2,
          "T.TSF_COMPROMISE": 3,
          "T.UNAUTHORIZED_ACCESS": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 4
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL2 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 4,
          "FAU_GEN.1.1": 3,
          "FAU_GEN.1.2": 2,
          "FAU_GEN.2": 4,
          "FAU_GEN.2.1": 3,
          "FAU_SEL.1": 7,
          "FAU_SEL.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 6,
          "FDP_ACF.1.1": 3,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 3,
          "FDP_ACF.1.4": 2,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 3,
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 3,
          "FIA_UAU.1.2": 2,
          "FIA_UID.1": 5,
          "FIA_UID.1.1": 3,
          "FIA_UID.1.2": 2,
          "FIA_USB.1": 5
        },
        "FMT": {
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 5,
          "FMT_MSA.3.1": 3,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 5,
          "FMT_MTD.1.1": 3,
          "FMT_REV.1": 13,
          "FMT_REV.1.1": 7,
          "FMT_REV.1.2": 8,
          "FMT_SMF.1": 5,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPT": {
          "FPT_TRC.1": 7,
          "FPT_TRC.1.1": 1,
          "FPT_TRC.1.2": 1
        },
        "FTA": {
          "FTA_MCS.1": 5,
          "FTA_MCS.1.1": 3,
          "FTA_MCS.1.2": 2,
          "FTA_TSE.1": 4,
          "FTA_TSE.1.1": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Audit Extension \u2022 PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide": 1,
          "Out of Scope": 2,
          "methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 \u201cTrust\u201d authentication option (not in TOE) When the trust authentication option is": 1,
          "platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: \u2022 Authenticator servers, if configured; and \u2022 Terminal emulator 1.5.9.4.3 Functional Dependencies": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 3
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 5
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "RFC": {
          "RFC 1321": 4,
          "RFC 1413": 2,
          "RFC 1964": 1,
          "RFC 2743": 1,
          "RFC 4510": 1,
          "RFC 7677": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Paul Laurence",
      "/CreationDate": "D:20210316110349-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20210316110349-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 1146452,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 79
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL2+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "DBMS_PPV2.12"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf",
        "pp_name": "Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/516%20LSS%20CR.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/Security%20Target%20-%20Crunchy%20Certified%20PostgreSQL%2012%20-%20v1.8%20-%20515-LSS.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "62dcccf374de788629d4d52afdf5702a3c275fe34f5b9ff8a92df0ac185ffc9d",
      "txt_hash": "da9aa84738e5ea013feef3cac77a0af37e0c6c9ddeb93d3d4ac5f80fe7448b89"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "522a896a3bd1386b7347ed32abf58950d4dbf8cac2fce7b48ee1205116621b69",
      "txt_hash": "8c9c3ab3dfce2272e80a885de7bc3479b5f45d8fd090ae68ccf084fa92cfbdb5"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8512df6f67ee2f8aa98cb383f2e3ae76577483fe8cc6ea43d21fc9f3e22fa42a",
      "txt_hash": "ead1b738c0d0b410749550f96bae9aabdb5e7114f4dd98f65d622904077031d5"
    }
  },
  "status": "active"
}