Logiciel Mistral Gateway IPSec version 9.0.7.2

CSV information ?

Status active
Valid from 28.06.2021
Valid until 28.06.2026
Scheme 🇫🇷 FR
Manufacturer Thalès Communications
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.3, AVA_VAN.3, EAL3+

Heuristics summary ?

Certificate ID: ANSSI-CC-2021/32

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Protocols
TLS

Security level
EAL 3, EAL2, EAL3, EAL4, EAL 1, EAL 5, EAL 7, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.3, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
ANSSI-CC-2021/32
Evaluation facilities
OPPIDA

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date: D:20210720171215+02'00'
Modification date: D:20210720171215+02'00'
Pages: 13
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 11.0 (Windows)

References

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-384
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-256, SHA-384, SHA256
Schemes
MAC, Key Exchange
Protocols
SSH, SSL, SSL 2.0, SSL 3.0, SSL2.0, TLS, TLS 1.2, TLS 1.1, TLS 1.0, DTLS, IKE, IKEv2, IKEv1, IPsec, VPN
Randomness
RBG
Elliptic Curves
curve P-256, P-256, secp256r1, secp384r1, secp521r1
Block cipher modes
CBC, CTR, GCM, XTS
TLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

Vendor
Thales

Security level
EAL3+, EAL3, EAL3 augmented
Claims
O.PROTECTED_COMMUNICATIONS, O.POL_FILTERING, O.POL_DEFAULT, O.AUDIT, O.TIME_BASE, O.AUDIT_PROTECTION, O.SUPERVISION, O.SUPERVISION_IMPACT, O.ROLES, O.AUTHENTICATION_FAILURE, O.DISPLAY_BANNER, O.SESSION_LOCK, O.MANAGEMENT, O.VIEW_RULES, O.RESIDUAL_INFORMATION_CLEAR, O.DATA_ERASURE, O.LOCAL_DATA_PROTECTION, O.SELF_TEST, O.SOFTWARE_UPDATES, O.BOOT_CONTROL, O.CERTIFICATE_INJECTION, O.CRYPTO_PERIOD, O.CRYPTO_REGULATION, O.PROTECTED_COMMUNICATI, O.RESIDUAL_INFORMATION_C, O.PROTECTED_COMMUNICATION, T.SECURITY_FUNCTIONALITY_FAILURE, T.UNDETECTED_ACTIVITY, T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.UPDATE_COMPROMISE, T.USER_DATA_REUSE, T.MISUSE, T.TIME_BASE, T.RESIDUAL_DATA, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.TOE_CAPTURE, T.SECURITY_FUNCTIONALITY, T.UNTRUSTED_COMMUNICATI, T.WEAK_AUTHENTICATION_EN, A.LIMITED_FUNCTIONALITY, A.PHYSICAL_PROTECTION, A.REGULAR_UPDATES, A.TOE_ERASURE, A.NO_THRU_TRAFFIC_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.ALARM, A.POLICIES_CONTINUITY, A.ADMINISTRATION_NETWORK, A.ADMIN_CREDENTIALS_SECURE, A.SECURED_MANAGEMENT_DEVICES, A.ACCESS_CONTROL_MANAGEMENT_DEVICES, A.PHYSICAL_ENV_MANAGEMENT_DEVICES, A.AUDIT, A.SS_MMC_TO_TOE, A.DATA_TRANSPORTATION, A.NO_TRU_TRAFFIC_PROTECTION, A.ACCESS_CONTROL_MANAGEMENT_DE, A.PHYSICAL_ENV_MANAGEMENT_DEVIC, OE.TRUSTED_ADMIN, OE.AUDIT, OE.ALARM, OE.POLICIES_CONTINUITY, OE.ADMIN_CREDENTIALS_SECURE, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.TOE_INTEGRITY, OE.TIME_TOE, OE.TOE_ERASURE, OE.TOE_PRODUCTION, OE.NO_THRU_TRAFFIC_PROTECTION, OE.SECURED_MANAGEMENT_DEVICES, OE.ACCESS_CONTROL_MANAGEMENT_DEVICES, OE.PHYSICAL_ENV_MANAGEMENT_DEVICES, OE.AUDIT_RECORD, OE.LMGT_CONNECTION, OE.SS_MMC_TO_TOE, OE.DATA_TRANSPORTATION, OE.UPDATES, OE.SECURED_MANAGEMENT_, OE.ACCESS_CONTROL_MANA, OE.PHYSICAL_ENV_MANAGEM, OE.ADMIN_CREDENTIALS_SEC, OE.ACCESS_CONTROL_MANAGEMENT_DEVICE, OE.ACCESS_CONTROL_MANAGEMENT_D, OE.PHYSICAL_ENV_MANAGEMENT_DEVIC
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_GEN.1, FAU_STG_EXT.1, FAU_STG_EXT.4, FAU_GEN, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_STG_EXT.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_STG, FAU_STG.3, FAU_STG.1, FCO_CPC_EXT, FCO_CPC_EXT.1, FCO_CPC_EXT.1.1, FCO_CPC_EXT.1.3, FCO_CPC_EXT.1.2, FCS_RBG_EXT, FCS_TLSC_EXT, FCS_TLSS_EXT, FCS_CKM_EXT.5, FCS_CKM.1, FCS_CKM.2, FCS_COP, FCS_RBG_EXT.1, FCS_CKM_EXT, FCS_TLSC_EXT.2, FCS_TLSC_EXT.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.2.2, FCS_TLSC_EXT.2.3, FCS_TLSC_EXT.2.4, FCS_TLSC_EXT.2.5, FCS_TLSS_EXT.2, FCS_TLSS_EXT.2.1, FCS_TLSS_EXT.2.2, FCS_TLSS_EXT.2.3, FCS_TLSS_EXT.2.4, FCS_TLSS_EXT.2.5, FCS_TLSS_EXT.2.6, FCS_CKM.4, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.5.3, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC, FDP_ETC, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ETC.2, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP.2, FDP_RIP.2.1, FDP_ACC.1, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU_EXT, FIA_UID.2, FIA_UAU.6, FIA_UAU.7, FIA_PMG_EXT.1, FIA_UAU_EXT.2, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UID.2.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UIA, FIA_UID.1, FIA_UAU.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF, FMT_MOF.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MSA.1, FMT_SMR.1, FPT_SKP_EXT, FPT_APW_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_STM_EXT, FPT_SDP_EXT, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_STM_EXT.1, FPT_PTD, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FPT_SDP_EXT.2, FPT_SDP_EXT.2.1, FPT_SDP_EXT.2.2, FPT_TDC, FPT_TDC.1, FPT_RCV.1, FPT_RCV.1.1, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_FLS.1, FPT_FLS.1.1, FPT_STM.1, FTA_SSL_EXT, FTA_SSL.3, FTA_SSL.4, FTA_SSL_EXT.1, FTA_TAB.1, FTA_SSL, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Certification process
out of scope, Out of scope, of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the, System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY

Certification process
out of scope, Out of scope, of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the, System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY

Standards
FIPS PUB 186-4, PKCS #1, RFC 4301, RFC 4303, RFC 4106, RFC 4109, RFC 4304, RFC 4868, RFC 7296, RFC 5282, RFC 4945, RFC 5246, RFC 4346, RFC 6125, RFC 5280, RFC 6960, RFC 5759, RFC 2986, RFC5289, ISO/IEC 9796-2, ISO/IEC 9797-, ISO/IEC 18031:2011, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: CDS_Mistral IPVS9.0_63535113-306_-Llite
Author: T0159776
Creation date: D:20210607172705+02'00'
Modification date: D:20210607172705+02'00'
Pages: 119
Creator: PDFCreator Free 4.2.0
Producer: GPL Ghostscript 9.52

References

Heuristics ?

Certificate ID: ANSSI-CC-2021/32

Extracted SARs

ASE_OBJ.2, ADV_FSP.4, ASE_TSS.1, ADV_IMP.1, ADV_ARC.1, ALC_DEL.1, ALC_CMC.3, ADV_TDS.3, ALC_DVS.1, AVA_VAN.3, ASE_REQ.2, ATE_FUN.1, ATE_COV.2, ASE_CCL.1, ATE_DPT.1, ALC_FLR.3, ASE_ECD.1, AGD_OPE.1, AGD_PRE.1, ASE_SPD.1, ATE_IND.2, ASE_INT.1, ALC_CMS.3, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Logiciel Mistral Gateway IPSec version 9.0.7.2 was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['9.0.7.2']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '6ea6e2aa704b3d8bdb34e2155062937191ae5ed658c1190b684465b8addfb87c', 'st_pdf_hash': '52f3a871fc949001f97f41be5a966d3b858bf24f026f15932a8ff80d61bd2ea7', 'report_txt_hash': '5c26a2ac3e13b31da65c849626d4c141dc5245719de7ae27ff349ffead51f2c6', 'st_txt_hash': 'ae3b67c9348e1204359853a3278316c94ca6066b0de37c90f55a224b4b56d716'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 3}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_block_cipher_modes': {'__insert__': {'XTS': 8}}, 'rules_ecc_curves': {'__insert__': {'P-028': 1, 'P-256': 1}}} data.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/32': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 3, 'EAL2': 3, 'EAL3': 2, 'EAL4': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 4': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 3+': 1}, 'ITSEC': {'ITSEC E3 ElĂ©mentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3+': 4, 'EAL3': 4, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.3': 9, 'ADV_TDS.2': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.3': 5, 'ALC_CMC.3': 2, 'ALC_CMS.3': 3, 'ALC_DEL.1': 2, 'ALC_DVS.1': 4, 'ALC_LCD.1': 4, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 2, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.3': 5}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 6, 'ASE_INT.1': 6, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_SPD.1': 4, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 2, 'FAU_GEN.1': 16, 'FAU_GEN.2': 6, 'FAU_STG_EXT.1': 14, 'FAU_STG_EXT.4': 3, 'FAU_GEN': 16, 'FAU_STG_EXT.1.1': 2, 'FAU_STG_EXT.1.2': 2, 'FAU_STG_EXT.1.3': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_STG.1': 1}, 'FCO': {'FCO_CPC_EXT': 2, 'FCO_CPC_EXT.1': 11, 'FCO_CPC_EXT.1.1': 3, 'FCO_CPC_EXT.1.3': 3, 'FCO_CPC_EXT.1.2': 3}, 'FCS': {'FCS_RBG_EXT': 2, 'FCS_TLSC_EXT': 4, 'FCS_TLSS_EXT': 3, 'FCS_CKM_EXT.5': 8, 'FCS_CKM.1': 48, 'FCS_CKM.2': 17, 'FCS_RBG_EXT.1': 21, 'FCS_TLSC_EXT.2': 11, 'FCS_TLSS_EXT.2': 9, 'FCS_TLSC_EXT.1': 1, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_TLSC_EXT.2.1': 2, 'FCS_TLSC_EXT.2.2': 2, 'FCS_TLSC_EXT.2.3': 2, 'FCS_TLSC_EXT.2.4': 2, 'FCS_TLSC_EXT.2.5': 2, 'FCS_TLSS_EXT.2.1': 2, 'FCS_TLSS_EXT.2.2': 2, 'FCS_TLSS_EXT.2.3': 2, 'FCS_TLSS_EXT.2.4': 2, 'FCS_TLSS_EXT.2.5': 2, 'FCS_TLSS_EXT.2.6': 2, 'FCS_CKM': 1, 'FCS_CKM.4': 38, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.5.3': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 3}, 'FDP': {'FDP_UCT.1': 8, 'FDP_UIT.1': 11, 'FDP_ITC.1': 16, 'FDP_ITC.2': 16, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_RIP.2': 5, 'FDP_RIP.2.1': 1, 'FDP_ETC.2': 4, 'FDP_IFF.1': 4, 'FDP_ACC.1': 5, 'FDP_IFC.1': 7}, 'FIA': {'FIA_PMG_EXT': 2, 'FIA_UIA_EXT': 2, 'FIA_UAU_EXT': 2, 'FIA_UID.2': 8, 'FIA_UAU.6': 6, 'FIA_UAU.7': 7, 'FIA_PMG_EXT.1': 10, 'FIA_UIA_EXT.1': 16, 'FIA_UAU_EXT.2': 10, 'FIA_PMG_EXT.1.1': 2, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_UAU_EXT.2.1': 2, 'FIA_UID.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_AFL.1': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UIA': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 4}, 'FMT': {'FMT_MSA.3': 13, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.2': 10, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMF.1': 11, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 7, 'FMT_MTD.1.1': 1, 'FMT_MSA.1': 2, 'FMT_SMR.1': 4}, 'FPT': {'FPT_SKP_EXT': 2, 'FPT_APW_EXT': 2, 'FPT_TST_EXT': 2, 'FPT_TUD_EXT': 2, 'FPT_STM_EXT': 2, 'FPT_SDP_EXT': 3, 'FPT_SKP_EXT.1': 9, 'FPT_TUD_EXT.1': 11, 'FPT_APW_EXT.1': 10, 'FPT_TST_EXT.1': 10, 'FPT_STM_EXT.1': 16, 'FPT_SDP_EXT.2': 11, 'FPT_PTD': 1, 'FPT_SKP_EXT.1.1': 3, 'FPT_APW_EXT.1.1': 2, 'FPT_APW_EXT.1.2': 2, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_STM': 1, 'FPT_STM_EXT.1.1': 2, 'FPT_STM_EXT.1.2': 2, 'FPT_SDP_EXT.2.1': 2, 'FPT_SDP_EXT.2.2': 2, 'FPT_RCV.1': 5, 'FPT_RCV.1.1': 1, 'FPT_RCV.2': 5, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_TDC.1': 3, 'FPT_STM.1': 1}, 'FTA': {'FTA_SSL_EXT': 3, 'FTA_SSL.3': 6, 'FTA_SSL.4': 6, 'FTA_SSL_EXT.1': 11, 'FTA_TAB.1': 9, 'FTA_SSL': 1, 'FTA_SSL_EXT.1.1': 2, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 18, 'FTP_TRP.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.PROTECTED_COMMUNICATIONS': 12, 'O.POL_FILTERING': 12, 'O.POL_DEFAULT': 12, 'O.AUDIT': 14, 'O.TIME_BASE': 8, 'O.AUDIT_PROTECTION': 9, 'O.SUPERVISION': 10, 'O.SUPERVISION_IMPACT': 8, 'O.ROLES': 10, 'O.AUTHENTICATION_FAILURE': 9, 'O.DISPLAY_BANNER': 10, 'O.SESSION_LOCK': 8, 'O.MANAGEMENT': 11, 'O.VIEW_RULES': 11, 'O.RESIDUAL_INFORMATION_CLEAR': 8, 'O.DATA_ERASURE': 8, 'O.LOCAL_DATA_PROTECTION': 14, 'O.SELF_TEST': 11, 'O.SOFTWARE_UPDATES': 8, 'O.BOOT_CONTROL': 9, 'O.CERTIFICATE_INJECTION': 4, 'O.CRYPTO_PERIOD': 8, 'O.CRYPTO_REGULATION': 11, 'O.PROTECTED_COMMUNICATI': 1, 'O.RESIDUAL_INFORMATION_C': 1, 'O.PROTECTED_COMMUNICATION': 2}, 'T': {'T.SECURITY_FUNCTIONALITY_FAILURE': 3, 'T.UNDETECTED_ACTIVITY': 5, 'T.MISUSE': 5, 'T.RESIDUAL_DATA': 5, 'T.WEAK_CRYPTOGRAPHY': 5, 'T.UNTRUSTED_COMMUNICATION_CHANNELS': 3, 'T.PASSWORD_CRACKING': 5, 'T.SECURITY_FUNCTIONALITY_COMPROMISE': 3, 'T.UNAUTHORIZED_ADMINISTRATOR_ACCESS': 2, 'T.UPDATE_COMPROMISE': 4, 'T.USER_DATA_REUSE': 4, 'T.TIME_BASE': 4, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 2, 'T.TOE_CAPTURE': 4, 'T.SECURITY_FUNCTIONALITY': 2, 'T.UNAUTHORIZED_ADMINIST': 2, 'T.UNTRUSTED_COMMUNICATI': 2, 'T.WEAK_AUTHENTICATION_EN': 2, 'T.SECURITY_FUNCTIONALITY_': 2, 'T.N': 1}, 'A': {'A.LIMITED_FUNCTIONALITY': 2, 'A.PHYSICAL_PROTECTION': 2, 'A.REGULAR_UPDATES': 2, 'A.TOE_ERASURE': 2, 'A.NO_THRU_TRAFFIC_PROTECTION': 1, 'A.TRUSTED_ADMINISTRATOR': 2, 'A.ALARM': 2, 'A.POLICIES_CONTINUITY': 2, 'A.ADMINISTRATION_NETWORK': 1, 'A.ADMIN_CREDENTIALS_SECURE': 2, 'A.SECURED_MANAGEMENT_DEVICES': 2, 'A.ACCESS_CONTROL_MANAGEMENT_DEVICES': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVICES': 1, 'A.AUDIT': 2, 'A.SS_MMC_TO_TOE': 2, 'A.DATA_TRANSPORTATION': 2, 'A.NO_TRU_TRAFFIC_PROTECTION': 1, 'A.ACCESS_CONTROL_MANAGEMENT_DE': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVIC': 1}, 'OE': {'OE.TRUSTED_ADMIN': 3, 'OE.AUDIT': 2, 'OE.ALARM': 3, 'OE.POLICIES_CONTINUITY': 2, 'OE.ADMIN_CREDENTIALS_SECURE': 3, 'OE.PHYSICAL': 2, 'OE.NO_GENERAL_PURPOSE': 2, 'OE.TOE_INTEGRITY': 7, 'OE.TIME_TOE': 3, 'OE.TOE_ERASURE': 5, 'OE.TOE_PRODUCTION': 3, 'OE.NO_THRU_TRAFFIC_PROTECTION': 2, 'OE.SECURED_MANAGEMENT_DEVICES': 4, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICES': 2, 'OE.PHYSICAL_ENV_MANAGEMENT_DEVICES': 3, 'OE.AUDIT_RECORD': 3, 'OE.LMGT_CONNECTION': 5, 'OE.SS_MMC_TO_TOE': 5, 'OE.DATA_TRANSPORTATION': 4, 'OE.UPDATES': 4, 'OE.SECURED_MANAGEMENT_': 1, 'OE.ACCESS_CONTROL_MANA': 1, 'OE.PHYSICAL_ENV_MANAGEM': 1, 'OE.ADMIN_CREDENTIALS_SEC': 1, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICE': 2, 'OE.ACCESS_CONTROL_MANAGEMENT_D': 1, 'OE.PHYSICAL_ENV_MANAGEMENT_DEVIC': 1}}, 'vendor': {'STMicroelectronics': {'STM': 26}, 'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18}}, 'constructions': {'MAC': {'HMAC': 3, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 25}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 4, 'Diffie-Hellman': 7}, 'DSA': {'DSA': 27}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 5, 'SHA-256': 2, 'SHA-384': 2, 'SHA384': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 8}, 'KEX': {'Key Exchange': 1}, 'KA': {'KA': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 5, 'SSL 2.0': 1, 'SSL 3.0': 2, 'SSL2.0': 1}, 'TLS': {'TLS': 53, 'TLS 1.2': 5, 'TLS 1.1': 4, 'TLS 1.0': 2}}, 'PACE': {'PACE': 2}, 'IKE': {'IKE': 23, 'IKEv2': 20, 'IKEv1': 5}, 'IPsec': {'IPsec': 14}}, 'randomness': {'PRNG': {'DRBG': 4}, 'RNG': {'RBG': 6}}, 'cipher_mode': {'CBC': {'CBC': 9}, 'CTR': {'CTR': 15}, 'GCM': {'GCM': 23}, 'XTS': {'XTS': 8}}, 'ecc_curve': {'NIST': {'curve P-256': 1, 'P-028': 1, 'P-256': 1, 'secp256r1': 8, 'secp384r1': 2, 'secp521r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 33}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 1}, 'PKCS': {'PKCS #1': 1}, 'RFC': {'RFC 4303': 2, 'RFC 4106': 2, 'RFC 4109': 1, 'RFC 4304': 1, 'RFC 4868': 3, 'RFC 7296': 3, 'RFC 5282': 2, 'RFC 4945': 2, 'RFC 5246': 4, 'RFC 4346': 2, 'RFC 6125': 2, 'RFC 5280': 5, 'RFC 6960': 1, 'RFC 5759': 2, 'RFC 2986': 2, 'RFC 4301': 1, 'RFC5289': 2}, 'ISO': {'ISO/IEC 9796-2': 1, 'ISO/IEC 9797-': 2, 'ISO/IEC 18031:2011': 4}, 'X509': {'X.509': 12}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Out of scope': 1, '. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target': 1, 'of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the': 1, 'ating System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2021_32fr.pdf', 'st_filename': 'anssi-cible-cc-2021_32en.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__delete__': ['EAL 2', 'EAL 4', 'EAL 6', 'EAL 3+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 3, 'ALC_FLR': 2}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_TDS.2': 3}}, 'AGD': {'__update__': {'AGD_PRE.1': 4}}, 'ALC': {'__update__': {'ALC_FLR.3': 6, 'ALC_CMS.3': 2, 'ALC_DVS.1': 3}}, 'ATE': {'__update__': {'ATE_DPT.1': 3, 'ATE_FUN.1': 6, 'ATE_IND.2': 1}}, 'AVA': {'__update__': {'AVA_VAN.3': 7}}, 'ASE': {'__update__': {'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 2}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_STG_EXT.2': 2, 'FAU_STG': 6, 'FAU_STG.3': 1}, '__update__': {'FAU_STG_EXT': 13, 'FAU_GEN.2': 5, 'FAU_STG_EXT.1': 13, 'FAU_STG_EXT.1.3': 4}}, 'FCO': {'__update__': {'FCO_CPC_EXT.1': 12}}, 'FCS': {'__insert__': {'FCS_COP': 101, 'FCS_CKM_EXT': 13}, '__update__': {'FCS_TLSS_EXT': 4, 'FCS_CKM_EXT.5': 17, 'FCS_CKM.2': 13, 'FCS_TLSC_EXT.2': 10, 'FCS_TLSS_EXT.2': 6, 'FCS_CKM': 2, 'FCS_CKM.4': 23, 'FCS_COP.1': 18}}, 'FDP': {'__insert__': {'FDP_ITC': 13, 'FDP_ETC': 2, 'FDP_IFC': 19, 'FDP_IFF': 16}, '__update__': {'FDP_UIT.1': 10, 'FDP_ITC.2': 26, 'FDP_ETC.2': 8, 'FDP_IFF.1': 14, 'FDP_IFC.1': 9}}, 'FIA': {'__update__': {'FIA_UIA_EXT': 4, 'FIA_PMG_EXT.1': 9, 'FIA_UIA_EXT.1': 14, 'FIA_AFL.1': 6, 'FIA_UAU.1': 2}}, 'FMT': {'__insert__': {'FMT_MOF': 10, 'FMT_MOF.1': 2}, '__update__': {'FMT_MSA.3': 14, 'FMT_SMR.2': 7, 'FMT_SMF.1': 12, 'FMT_MTD.1': 8, 'FMT_MSA.1': 1}}, 'FPT': {'__insert__': {'FPT_TDC': 11}, '__update__': {'FPT_TUD_EXT.1': 10, 'FPT_TST_EXT.1': 9, 'FPT_STM_EXT.1': 15, 'FPT_SDP_EXT.2': 10, 'FPT_STM': 2, 'FPT_TDC.1': 7}}, 'FTP': {'__insert__': {'FTP_ITC': 1}, '__update__': {'FTP_ITC.1': 19, 'FTP_TRP.1': 10}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.POL_FILTERING': 8, 'O.TIME_BASE': 4, 'O.AUDIT_PROTECTION': 5, 'O.SUPERVISION': 6, 'O.DISPLAY_BANNER': 6, 'O.SESSION_LOCK': 4, 'O.MANAGEMENT': 7, 'O.RESIDUAL_INFORMATION_CLEAR': 4, 'O.BOOT_CONTROL': 5, 'O.CRYPTO_REGULATION': 7}}, 'T': {'__update__': {'T.WEAK_CRYPTOGRAPHY': 3, 'T.UNAUTHORIZED_ADMINISTRATOR_ACCESS': 3, 'T.UPDATE_COMPROMISE': 5, 'T.USER_DATA_REUSE': 3, 'T.TIME_BASE': 3, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 3, 'T.TOE_CAPTURE': 5}, '__delete__': ['T.UNAUTHORIZED_ADMINIST', 'T.SECURITY_FUNCTIONALITY_', 'T.N']}, 'A': {'__update__': {'A.PHYSICAL_PROTECTION': 1, 'A.TOE_ERASURE': 1, 'A.TRUSTED_ADMINISTRATOR': 1, 'A.POLICIES_CONTINUITY': 1, 'A.SECURED_MANAGEMENT_DEVICES': 1, 'A.SS_MMC_TO_TOE': 1}}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 7}}}}, 'FF': {'__update__': {'DH': {'__update__': {'DH': 2}}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA256': 1, 'SHA-256': 1, 'SHA-384': 1}, '__delete__': ['SHA384']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 3}}}, '__delete__': ['KA']}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 4}}}}, 'IKE': {'__update__': {'IKEv2': 21}}, 'IPsec': {'__update__': {'IPsec': 15}}}, '__delete__': ['PACE']}, 'randomness': {'__update__': {'RNG': {'__update__': {'RBG': 2}}}, '__delete__': ['PRNG']}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 3}}, 'CTR': {'__update__': {'CTR': 2}}, 'GCM': {'__update__': {'GCM': 3}}, 'XTS': {'__update__': {'XTS': 2}}}}, 'ecc_curve': {'__update__': {'NIST': {'__delete__': ['P-028']}}}, 'side_channel_analysis': {}, 'tee_name': {}, 'standard_id': {'__update__': {'RFC': {'__update__': {'RFC 4301': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY': 1}, '__delete__': ['. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target', 'ating System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY']}}}} data.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 50}}, '__update__': {'TLS': {'__insert__': {'DTLS': {'DTLS': 1}}}}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat-2021_32.pdf",
  "dgst": "2edfcbada0ee3f6a",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "ANSSI-CC-2021/32",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.0.7.2"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Thal\u00e8s Communications",
  "manufacturer_web": "https://www.thalescomminc.com/",
  "name": "Logiciel Mistral Gateway IPSec version 9.0.7.2",
  "not_valid_after": "2026-06-28",
  "not_valid_before": "2021-06-28",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "anssi-cc-2021_32fr.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/32": 4
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.3": 3,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 3,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL2": 3,
          "EAL3": 2,
          "EAL4": 1
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "OPPIDA": {
          "OPPIDA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20210720171215+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20210720171215+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 188301,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "anssi-cible-cc-2021_32en.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 7
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS_CONTROL_MANAGEMENT_DE": 1,
          "A.ACCESS_CONTROL_MANAGEMENT_DEVICES": 1,
          "A.ADMINISTRATION_NETWORK": 1,
          "A.ADMIN_CREDENTIALS_SECURE": 2,
          "A.ALARM": 2,
          "A.AUDIT": 2,
          "A.DATA_TRANSPORTATION": 2,
          "A.LIMITED_FUNCTIONALITY": 2,
          "A.NO_THRU_TRAFFIC_PROTECTION": 1,
          "A.NO_TRU_TRAFFIC_PROTECTION": 1,
          "A.PHYSICAL_ENV_MANAGEMENT_DEVIC": 1,
          "A.PHYSICAL_ENV_MANAGEMENT_DEVICES": 1,
          "A.PHYSICAL_PROTECTION": 1,
          "A.POLICIES_CONTINUITY": 1,
          "A.REGULAR_UPDATES": 2,
          "A.SECURED_MANAGEMENT_DEVICES": 1,
          "A.SS_MMC_TO_TOE": 1,
          "A.TOE_ERASURE": 1,
          "A.TRUSTED_ADMINISTRATOR": 1
        },
        "O": {
          "O.AUDIT": 14,
          "O.AUDIT_PROTECTION": 5,
          "O.AUTHENTICATION_FAILURE": 9,
          "O.BOOT_CONTROL": 5,
          "O.CERTIFICATE_INJECTION": 4,
          "O.CRYPTO_PERIOD": 8,
          "O.CRYPTO_REGULATION": 7,
          "O.DATA_ERASURE": 8,
          "O.DISPLAY_BANNER": 6,
          "O.LOCAL_DATA_PROTECTION": 14,
          "O.MANAGEMENT": 7,
          "O.POL_DEFAULT": 12,
          "O.POL_FILTERING": 8,
          "O.PROTECTED_COMMUNICATI": 1,
          "O.PROTECTED_COMMUNICATION": 2,
          "O.PROTECTED_COMMUNICATIONS": 12,
          "O.RESIDUAL_INFORMATION_C": 1,
          "O.RESIDUAL_INFORMATION_CLEAR": 4,
          "O.ROLES": 10,
          "O.SELF_TEST": 11,
          "O.SESSION_LOCK": 4,
          "O.SOFTWARE_UPDATES": 8,
          "O.SUPERVISION": 6,
          "O.SUPERVISION_IMPACT": 8,
          "O.TIME_BASE": 4,
          "O.VIEW_RULES": 11
        },
        "OE": {
          "OE.ACCESS_CONTROL_MANA": 1,
          "OE.ACCESS_CONTROL_MANAGEMENT_D": 1,
          "OE.ACCESS_CONTROL_MANAGEMENT_DEVICE": 2,
          "OE.ACCESS_CONTROL_MANAGEMENT_DEVICES": 2,
          "OE.ADMIN_CREDENTIALS_SEC": 1,
          "OE.ADMIN_CREDENTIALS_SECURE": 3,
          "OE.ALARM": 3,
          "OE.AUDIT": 2,
          "OE.AUDIT_RECORD": 3,
          "OE.DATA_TRANSPORTATION": 4,
          "OE.LMGT_CONNECTION": 5,
          "OE.NO_GENERAL_PURPOSE": 2,
          "OE.NO_THRU_TRAFFIC_PROTECTION": 2,
          "OE.PHYSICAL": 2,
          "OE.PHYSICAL_ENV_MANAGEM": 1,
          "OE.PHYSICAL_ENV_MANAGEMENT_DEVIC": 1,
          "OE.PHYSICAL_ENV_MANAGEMENT_DEVICES": 3,
          "OE.POLICIES_CONTINUITY": 2,
          "OE.SECURED_MANAGEMENT_": 1,
          "OE.SECURED_MANAGEMENT_DEVICES": 4,
          "OE.SS_MMC_TO_TOE": 5,
          "OE.TIME_TOE": 3,
          "OE.TOE_ERASURE": 5,
          "OE.TOE_INTEGRITY": 7,
          "OE.TOE_PRODUCTION": 3,
          "OE.TRUSTED_ADMIN": 3,
          "OE.UPDATES": 4
        },
        "T": {
          "T.MISUSE": 5,
          "T.PASSWORD_CRACKING": 5,
          "T.RESIDUAL_DATA": 5,
          "T.SECURITY_FUNCTIONALITY": 2,
          "T.SECURITY_FUNCTIONALITY_COMPROMISE": 3,
          "T.SECURITY_FUNCTIONALITY_FAILURE": 3,
          "T.TIME_BASE": 3,
          "T.TOE_CAPTURE": 5,
          "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 3,
          "T.UNDETECTED_ACTIVITY": 5,
          "T.UNTRUSTED_COMMUNICATI": 2,
          "T.UNTRUSTED_COMMUNICATION_CHANNELS": 3,
          "T.UPDATE_COMPROMISE": 5,
          "T.USER_DATA_REUSE": 3,
          "T.WEAK_AUTHENTICATION_EN": 2,
          "T.WEAK_AUTHENTICATION_ENDPOINTS": 3,
          "T.WEAK_CRYPTOGRAPHY": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.3": 9,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 3,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 10,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.3": 2,
          "ALC_CMS.1": 1,
          "ALC_CMS.3": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 3,
          "ALC_FLR.3": 6,
          "ALC_LCD.1": 4
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 5,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 4,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 4,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 4,
          "EAL3 augmented": 1,
          "EAL3+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 16,
          "FAU_GEN.1": 16,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_STG": 6,
          "FAU_STG.1": 1,
          "FAU_STG.3": 1,
          "FAU_STG_EXT": 13,
          "FAU_STG_EXT.1": 13,
          "FAU_STG_EXT.1.1": 2,
          "FAU_STG_EXT.1.2": 2,
          "FAU_STG_EXT.1.3": 4,
          "FAU_STG_EXT.2": 2,
          "FAU_STG_EXT.4": 3
        },
        "FCO": {
          "FCO_CPC_EXT": 2,
          "FCO_CPC_EXT.1": 12,
          "FCO_CPC_EXT.1.1": 3,
          "FCO_CPC_EXT.1.2": 3,
          "FCO_CPC_EXT.1.3": 3
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 48,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 13,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 23,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXT": 13,
          "FCS_CKM_EXT.5": 17,
          "FCS_CKM_EXT.5.1": 1,
          "FCS_CKM_EXT.5.2": 1,
          "FCS_CKM_EXT.5.3": 1,
          "FCS_COP": 101,
          "FCS_COP.1": 18,
          "FCS_RBG_EXT": 2,
          "FCS_RBG_EXT.1": 21,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_RBG_EXT.1.2": 2,
          "FCS_TLSC_EXT": 4,
          "FCS_TLSC_EXT.1": 1,
          "FCS_TLSC_EXT.2": 10,
          "FCS_TLSC_EXT.2.1": 2,
          "FCS_TLSC_EXT.2.2": 2,
          "FCS_TLSC_EXT.2.3": 2,
          "FCS_TLSC_EXT.2.4": 2,
          "FCS_TLSC_EXT.2.5": 2,
          "FCS_TLSS_EXT": 4,
          "FCS_TLSS_EXT.2": 6,
          "FCS_TLSS_EXT.2.1": 2,
          "FCS_TLSS_EXT.2.2": 2,
          "FCS_TLSS_EXT.2.3": 2,
          "FCS_TLSS_EXT.2.4": 2,
          "FCS_TLSS_EXT.2.5": 2,
          "FCS_TLSS_EXT.2.6": 2
        },
        "FDP": {
          "FDP_ACC.1": 5,
          "FDP_ETC": 2,
          "FDP_ETC.2": 8,
          "FDP_IFC": 19,
          "FDP_IFC.1": 9,
          "FDP_IFF": 16,
          "FDP_IFF.1": 14,
          "FDP_ITC": 13,
          "FDP_ITC.1": 16,
          "FDP_ITC.2": 26,
          "FDP_RIP.2": 5,
          "FDP_RIP.2.1": 1,
          "FDP_UCT.1": 8,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 10,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_PMG_EXT": 2,
          "FIA_PMG_EXT.1": 9,
          "FIA_PMG_EXT.1.1": 2,
          "FIA_UAU.1": 2,
          "FIA_UAU.6": 6,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 7,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT": 2,
          "FIA_UAU_EXT.2": 10,
          "FIA_UAU_EXT.2.1": 2,
          "FIA_UIA": 1,
          "FIA_UIA_EXT": 4,
          "FIA_UIA_EXT.1": 14,
          "FIA_UIA_EXT.1.1": 2,
          "FIA_UIA_EXT.1.2": 2,
          "FIA_UID.1": 5,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 10,
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 4,
          "FMT_SMR.2": 7,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_APW_EXT": 2,
          "FPT_APW_EXT.1": 10,
          "FPT_APW_EXT.1.1": 2,
          "FPT_APW_EXT.1.2": 2,
          "FPT_FLS.1": 6,
          "FPT_FLS.1.1": 1,
          "FPT_PTD": 1,
          "FPT_RCV.1": 5,
          "FPT_RCV.1.1": 1,
          "FPT_RCV.2": 5,
          "FPT_RCV.2.1": 1,
          "FPT_RCV.2.2": 1,
          "FPT_SDP_EXT": 3,
          "FPT_SDP_EXT.2": 10,
          "FPT_SDP_EXT.2.1": 2,
          "FPT_SDP_EXT.2.2": 2,
          "FPT_SKP_EXT": 2,
          "FPT_SKP_EXT.1": 9,
          "FPT_SKP_EXT.1.1": 3,
          "FPT_STM": 2,
          "FPT_STM.1": 1,
          "FPT_STM_EXT": 2,
          "FPT_STM_EXT.1": 15,
          "FPT_STM_EXT.1.1": 2,
          "FPT_STM_EXT.1.2": 2,
          "FPT_TDC": 11,
          "FPT_TDC.1": 7,
          "FPT_TST_EXT": 2,
          "FPT_TST_EXT.1": 9,
          "FPT_TST_EXT.1.1": 2,
          "FPT_TUD_EXT": 2,
          "FPT_TUD_EXT.1": 10,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 2
        },
        "FTA": {
          "FTA_SSL": 1,
          "FTA_SSL.3": 6,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 6,
          "FTA_SSL.4.1": 1,
          "FTA_SSL_EXT": 3,
          "FTA_SSL_EXT.1": 11,
          "FTA_SSL_EXT.1.1": 2,
          "FTA_TAB.1": 9,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 19,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 10,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Out of scope": 1,
          "System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY": 1,
          "of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CTR": {
          "CTR": 2
        },
        "GCM": {
          "GCM": 3
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 23,
          "IKEv1": 5,
          "IKEv2": 21
        },
        "IPsec": {
          "IPsec": 15
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "DTLS": {
            "DTLS": 1
          },
          "SSL": {
            "SSL": 4,
            "SSL 2.0": 1,
            "SSL 3.0": 2,
            "SSL2.0": 1
          },
          "TLS": {
            "TLS": 53,
            "TLS 1.0": 2,
            "TLS 1.1": 4,
            "TLS 1.2": 5
          }
        },
        "VPN": {
          "VPN": 50
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 1,
          "curve P-256": 1,
          "secp256r1": 8,
          "secp384r1": 2,
          "secp521r1": 2
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS PUB 186-4": 1
        },
        "ISO": {
          "ISO/IEC 18031:2011": 4,
          "ISO/IEC 9796-2": 1,
          "ISO/IEC 9797-": 2
        },
        "PKCS": {
          "PKCS #1": 1
        },
        "RFC": {
          "RFC 2986": 2,
          "RFC 4106": 2,
          "RFC 4109": 1,
          "RFC 4301": 2,
          "RFC 4303": 2,
          "RFC 4304": 1,
          "RFC 4346": 2,
          "RFC 4868": 3,
          "RFC 4945": 2,
          "RFC 5246": 4,
          "RFC 5280": 5,
          "RFC 5282": 2,
          "RFC 5759": 2,
          "RFC 6125": 2,
          "RFC 6960": 1,
          "RFC 7296": 3,
          "RFC5289": 2
        },
        "X509": {
          "X.509": 12
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 18
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 3,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2
        }
      },
      "vendor": {
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "T0159776",
      "/CreationDate": "D:20210607172705+02\u002700\u0027",
      "/Creator": "PDFCreator Free 4.2.0",
      "/Keywords": "",
      "/ModDate": "D:20210607172705+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.52",
      "/Subject": "",
      "/Title": "CDS_Mistral IPVS9.0_63535113-306_-Llite",
      "pdf_file_size_bytes": 981294,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 119
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_32fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.3",
      "EAL3+",
      "AVA_VAN.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2021_32en.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "6ea6e2aa704b3d8bdb34e2155062937191ae5ed658c1190b684465b8addfb87c",
    "report_txt_hash": "5c26a2ac3e13b31da65c849626d4c141dc5245719de7ae27ff349ffead51f2c6",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "52f3a871fc949001f97f41be5a966d3b858bf24f026f15932a8ff80d61bd2ea7",
    "st_txt_hash": "ae3b67c9348e1204359853a3278316c94ca6066b0de37c90f55a224b4b56d716"
  },
  "status": "active"
}