XOmail

CSV information ?

Status archived
Valid from 23.02.2010
Valid until 01.09.2019
Scheme 🇳🇴 NO
Manufacturer Thales Norway AS
Category Other Devices and Systems
Security level EAL4

Heuristics summary ?

Certificate ID: SERTIT-014

Certification report ?

Extracted keywords

Security level
EAL 4+, EAL 4, EAL4+, EAL1, EAL7, EAL 4 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_IFC.2, FDP_IFF.1
Certificates
SERTIT-014
Evaluation facilities
Brightsight

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date: D:20100315130843
Modification date: D:20100315130843
Pages: 16

References

Security target ?

Extracted keywords

Schemes
MAC

Vendor
Microsoft

Security level
EAL4
Claims
O.ACCESS_HIST, O.AUDIT, O.AUTO_LOGOUT, O.CMD_ACL, O.CMD_LOG, O.DAC, O.ID_AUTH, O.LABELLING, O.LOCK, O.MAC, O.MAC_INTEGRITY, O.MANAGE, O.MESSAGING, O.RECOVER, O.REF_MONITOR, O.RESOURCE_SHARE, O.REUSE, O.ROLE_MNG, O.ROLES, O.SELF_TEST, O.DIG_SIGN, A.ADM_TRAINING, A.AUDIT_REVIEW, A.CONFIDENCE, A.INVALIDATE, A.NETWORK, A.NOTIFY, A.PHYSICAL, A.PHYSICAL_LOC, A.OS, A.USR_TRAINING, OE.ACCOUNTABLE, OE.AUDIT, OE.ID_AUTH, OE.NETWORK, OE.TRAF_SEPARATION, OE.PHYSICAL
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT.1.1, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADO_DEL.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_DVS.1, ADV_FSP.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_MSU.2, AVA_VLA.2
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN.1, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.3, FAU_STG.4, FAU_GEN.1.1, FAU_ARP.1.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_GEN.2.1, FDP_ACC.1, FDP_ACF.1, FDP_ETC.2, FDP_IFC.2, FDP_IFF.2, FDP_ITC.2, FDP_RIP.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.2.1, FDP_IFF.2.2, FDP_IFF.2.3, FDP_IFF.2.4, FDP_IFF.2.5, FDP_IFF.2.6, FDP_IFF.2.7, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_RIP.2.1, FDP_ITT.1, FDP_ITT.1.1, FDP_IFC.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_RCV.1, FPT_RCV.2, FPT_RCV.4, FPT_RVM.1, FPT_SEP.3, FPT_TDC.1, FPT_TST.1, FPT_FLS.1.1, FPT_RCV.1.1, FPT_RCV.2.1, FPT_RCV.2.2, FPT_RCV.4.1, FPT_RVM.1.1, FPT_SEP.3.1, FPT_SEP.3.2, FPT_SEP.3.3, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITT.1, FPT_STM.1, FPT_ITT.1.1, FPT_STM.1.1, FPT_AMT.1, FPT_TSE.1, FTA_SSL.3, FTA_TSE.1, FTA_SSL.3.1, FTP_ITC.1, FTP_TRP.1
Certification process
out of scope, MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using

Certification process
out of scope, MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using

Standards
RFC 2156, ISO/IEC 15408, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003

File metadata

Title: XOmail Version 14.2 Security Target ed 10-public
Author: Thales Norway AS
Creation date: D:20090430154245+02'00'
Modification date: D:20090430154245
Pages: 111
Creator: PDFCreator Version 0.9.3
Producer: AFPL Ghostscript 8.13

References

Heuristics ?

Certificate ID: SERTIT-014

Extracted SARs

ASE_OBJ.2, ADV_SPM.1, ASE_TSS.1, ALC_TAT.1, ADV_IMP.1, AGD_USR.1, ADV_ARC.1, ALC_DEL.1, AVA_VLA.2, ADV_TDS.3, ADV_LLD.1, ALC_DVS.1, AVA_VAN.5, ASE_REQ.2, ALC_CMS.4, ATE_FUN.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ADV_DVS.1, AGD_ADM.1, ASE_CCL.1, ATE_DPT.1, ASE_ECD.1, AGD_OPE.1, ALC_CMC.4, AVA_MSU.2, ADV_HLD.2, AGD_PRE.1, ASE_SPD.1, ATE_IND.2, ADV_RCR.1, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name XOmail was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '9e16b403f88963dd417e3bcd95f2bc133daebe222762d13fa0f4292d928638d4', 'st_pdf_hash': '974ccae11131e18df0b2ce17b82d56f0059de9e51bccd55afc4a85d7af4225e5', 'report_txt_hash': '9864510986169b3cc696235ffd45bfc1a79b56bff38ec0c23cec8d6ea4cbb898', 'st_txt_hash': '593bab6babc6547a7f1912678f0c9470914d6346a5670749076f40dc0420b2af'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'MAC': 69}, 'rules_randomness': {}, 'rules_tee': {'SE': 8}, 'rules_side_channels': {}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'NO': {'SERTIT-014': 16}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4+': 17, 'EAL 4': 3, 'EAL4+': 3, 'EAL1': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_IFC.2': 2, 'FDP_IFF.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 7}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 4, 'ACM_CAP.4': 3, 'ACM_SCP.2': 4, 'ACM_CAP.3': 3}, 'ADO': {'ADO_DEL.2': 5, 'ADO_IGS.1': 9, 'ADO_DEL.1': 1}, 'ADV': {'ADV_FSP.2': 4, 'ADV_HLD.2': 6, 'ADV_IMP.1': 6, 'ADV_LLD.1': 6, 'ADV_RCR.1': 8, 'ADV_SPM.1': 8, 'ADV_FSP.1': 9, 'ADV_HLD.1': 2}, 'AGD': {'AGD_ADM.1': 12, 'AGD_USR.1': 8}, 'ALC': {'ALC_DVS.1': 5, 'ALC_LCD.1': 4, 'ALC_TAT.1': 5}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 4, 'ATE_FUN.1': 7, 'ATE_IND.2': 4}, 'AVA': {'AVA_SOF.1': 5, 'AVA_MSU.2': 4, 'AVA_VLA.2': 4}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 9, 'FAU_GEN.1': 32, 'FAU_GEN.2': 16, 'FAU_SAA.1': 9, 'FAU_SAR.1': 20, 'FAU_SAR.2': 15, 'FAU_STG.1': 21, 'FAU_STG.3': 15, 'FAU_STG.4': 9, 'FAU_GEN.1.1': 1, 'FAU_ARP.1.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_GEN.2.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 7, 'FDP_ETC.2': 7, 'FDP_IFF.2': 8, 'FDP_IFC.2': 6, 'FDP_ITC.2': 7, 'FDP_RIP.2': 8, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_IFC.2.1': 1, 'FDP_IFC.2.2': 1, 'FDP_IFF.2.1': 1, 'FDP_IFF.2.2': 1, 'FDP_IFF.2.3': 1, 'FDP_IFF.2.4': 1, 'FDP_IFF.2.5': 1, 'FDP_IFF.2.6': 1, 'FDP_IFF.2.7': 1, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_RIP.2.1': 1, 'FDP_ITT.1': 5, 'FDP_ITT.1.1': 1, 'FDP_IFC.1': 5, 'FDP_IFF.1': 1}, 'FIA': {'FIA_ATD.1': 10, 'FIA_UID.2': 24, 'FIA_AFL.1': 6, 'FIA_UAU.2': 14, 'FIA_UAU.5': 7, 'FIA_USB.1': 11, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.1': 6}, 'FMT': {'FMT_SMR.1': 12, 'FMT_MSA.1': 8, 'FMT_MSA.3': 10, 'FMT_MTD.1': 6, 'FMT_SMF.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_RCV.1': 8, 'FPT_RCV.2': 9, 'FPT_RCV.4': 8, 'FPT_RVM.1': 8, 'FPT_TST.1': 10, 'FPT_SEP.3': 6, 'FPT_TDC.1': 10, 'FPT_FLS.1.1': 1, 'FPT_RCV.1.1': 1, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_RCV.4.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.3.1': 1, 'FPT_SEP.3.2': 1, 'FPT_SEP.3.3': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ITT.1': 5, 'FPT_STM.1': 7, 'FPT_ITT.1.1': 1, 'FPT_STM.1.1': 1, 'FPT_AMT.1': 2}, 'FTA': {'FTA_SSL.3': 7, 'FTA_TSE.1': 19, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 2, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.AUDIT': 16, 'O.CMD_LOG': 16, 'O.LABELLING': 10, 'O.LOCK': 9, 'O.MAC': 12, 'O.MANAGE': 9, 'O.MESSAGING': 9, 'O.RECOVER': 12, 'O.RESOURCE_SHARE': 8, 'O.ACCESS_HIST': 12, 'O.AUTO_LOGOUT': 9, 'O.CMD_ACL': 10, 'O.DAC': 10, 'O.ID_AUTH': 13, 'O.MAC_INTEGRITY': 9, 'O.REF_MONITOR': 8, 'O.REUSE': 9, 'O.ROLE_MNG': 9, 'O.ROLES': 10, 'O.SELF_TEST': 9, 'O.DIG_SIGN': 3, 'O.RESOURCE_SHAR': 2}, 'T': {'T.MONITORING': 4, 'T.REPLAY': 4, 'T.ADM_ERROR': 3, 'T.AUDIT_FAILURE': 3, 'T.COM_INTEGRITY': 3, 'T.DOS': 3, 'T.INSERTION': 3, 'T.MASQUERADE': 3, 'T.UNATTENDED': 3, 'T.UNAUTH_ACCESS': 3}, 'A': {'A.ADM_TRAINING': 4, 'A.NETWORK': 4, 'A.NOTIFY': 4, 'A.PHYSICAL_LOC': 4, 'A.OS': 5, 'A.AUDIT_REVIEW': 3, 'A.CONFIDENCE': 3, 'A.INVALIDATE': 3, 'A.PHYSICAL': 3, 'A.USR_TRAINING': 3, 'A.ADM': 7, 'A.INTERNAL': 17, 'A.DEVELOPER': 3, 'A.EXTERNAL': 13, 'A.SYSTEM_ERROR': 2, 'A.USER': 7}, 'OE': {'OE.ID_AUTH': 8, 'OE.NETWORK': 20, 'OE.INSTALL': 16, 'OE.PHYSICAL': 19, 'OE.ACCOUNTABLE': 10, 'OE.AUDIT': 13, 'OE.TRAF_SEPARATION': 10, 'OE.ADM_TRUST': 10}}, 'vendor': {'STMicroelectronics': {'STM': 8}, 'Microsoft': {'Microsoft': 3}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 69}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 8}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2156': 1}, 'ISO': {'ISO/IEC 15408': 10}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'n MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}]} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '20100223_SERTIT-008CR_issue201.0.pdf', 'st_filename': 'XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL7': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_DVS.2': 6}}}}, 'cc_sfr': {'__update__': {'FDP': {'__update__': {'FDP_IFF.1': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 8}}}}, 'cc_sar': {'__update__': {'ACM': {'__insert__': {'ACM_AUT.1.1': 1}, '__update__': {'ACM_AUT.1': 10, 'ACM_CAP.4': 20, 'ACM_SCP.2': 7, 'ACM_CAP.3': 1}}, 'ADO': {'__update__': {'ADO_DEL.2': 11, 'ADO_IGS.1': 13}}, 'ADV': {'__insert__': {'ADV_DVS.1': 1}, '__update__': {'ADV_FSP.2': 12, 'ADV_HLD.2': 17, 'ADV_IMP.1': 11, 'ADV_LLD.1': 18, 'ADV_RCR.1': 9, 'ADV_SPM.1': 15, 'ADV_FSP.1': 7}}, 'AGD': {'__update__': {'AGD_ADM.1': 22, 'AGD_USR.1': 16}}, 'ALC': {'__update__': {'ALC_DVS.1': 9, 'ALC_LCD.1': 9, 'ALC_TAT.1': 6}}, 'ATE': {'__update__': {'ATE_COV.2': 8, 'ATE_DPT.1': 7, 'ATE_FUN.1': 15, 'ATE_IND.2': 10}}, 'AVA': {'__update__': {'AVA_SOF.1': 10, 'AVA_MSU.2': 15, 'AVA_VLA.2': 15}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 33, 'FAU_SAA.1': 8}}, 'FDP': {'__update__': {'FDP_ACC.1': 11, 'FDP_ACF.1': 10, 'FDP_ETC.2': 10, 'FDP_IFF.2': 10, 'FDP_IFC.2': 9, 'FDP_ITC.2': 10, 'FDP_RIP.2': 9, 'FDP_IFF.2.2': 2, 'FDP_IFC.1': 4}, '__delete__': ['FDP_IFF.1']}, 'FIA': {'__update__': {'FIA_ATD.1': 11, 'FIA_AFL.1': 9, 'FIA_UAU.2': 17, 'FIA_UAU.5': 9, 'FIA_USB.1': 13, 'FIA_UID.1': 4}}, 'FMT': {'__update__': {'FMT_MSA.1': 10, 'FMT_MSA.3': 12, 'FMT_MTD.1': 8, 'FMT_SMF.1': 10}}, 'FPT': {'__insert__': {'FPT_TSE.1': 1}, '__update__': {'FPT_FLS.1': 8, 'FPT_RCV.2': 11, 'FPT_RCV.4': 9, 'FPT_RVM.1': 9, 'FPT_TST.1': 11, 'FPT_SEP.3': 10, 'FPT_TDC.1': 14}}, 'FTA': {'__update__': {'FTA_SSL.3': 8}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AUDIT': 13, 'O.LABELLING': 8, 'O.LOCK': 8, 'O.MAC': 9, 'O.MANAGE': 6, 'O.MESSAGING': 8, 'O.RECOVER': 9, 'O.RESOURCE_SHARE': 7, 'O.ACCESS_HIST': 13, 'O.AUTO_LOGOUT': 10, 'O.CMD_ACL': 7, 'O.DAC': 8, 'O.ID_AUTH': 14, 'O.MAC_INTEGRITY': 10, 'O.ROLE_MNG': 7, 'O.SELF_TEST': 8}, '__delete__': ['O.RESOURCE_SHAR']}, 'A': {'__update__': {'A.NOTIFY': 3, 'A.PHYSICAL_LOC': 3, 'A.CONFIDENCE': 4, 'A.PHYSICAL': 4}, '__delete__': ['A.ADM', 'A.INTERNAL', 'A.DEVELOPER', 'A.EXTERNAL', 'A.SYSTEM_ERROR', 'A.USER']}, 'OE': {'__update__': {'OE.NETWORK': 17, 'OE.PHYSICAL': 1, 'OE.ACCOUNTABLE': 11, 'OE.TRAF_SEPARATION': 11}, '__delete__': ['OE.INSTALL', 'OE.ADM_TRUST']}}, '__delete__': ['T']}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 74}}}}, 'side_channel_analysis': {}, 'tee_name': {}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using': 1}, '__delete__': ['n MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using']}}}} data.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_DVS', 'level': 1}]} values added.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "3ba740ca6ee8ed75",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "SERTIT-014",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Thales Norway AS",
  "manufacturer_web": "https://www.thales.no/",
  "name": "XOmail",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2010-02-23",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "20100223_SERTIT-008CR_issue201.0.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NO": {
          "SERTIT-014": 16
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 6,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL 4 augmented": 1,
          "EAL 4+": 17,
          "EAL1": 1,
          "EAL4+": 3,
          "EAL7": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_IFC.2": 2,
          "FDP_IFF.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20100315130843",
      "/ModDate": "D:20100315130843",
      "pdf_file_size_bytes": 542517,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADM_TRAINING": 4,
          "A.AUDIT_REVIEW": 3,
          "A.CONFIDENCE": 4,
          "A.INVALIDATE": 3,
          "A.NETWORK": 4,
          "A.NOTIFY": 3,
          "A.OS": 5,
          "A.PHYSICAL": 4,
          "A.PHYSICAL_LOC": 3,
          "A.USR_TRAINING": 3
        },
        "O": {
          "O.ACCESS_HIST": 13,
          "O.AUDIT": 13,
          "O.AUTO_LOGOUT": 10,
          "O.CMD_ACL": 7,
          "O.CMD_LOG": 16,
          "O.DAC": 8,
          "O.DIG_SIGN": 3,
          "O.ID_AUTH": 14,
          "O.LABELLING": 8,
          "O.LOCK": 8,
          "O.MAC": 9,
          "O.MAC_INTEGRITY": 10,
          "O.MANAGE": 6,
          "O.MESSAGING": 8,
          "O.RECOVER": 9,
          "O.REF_MONITOR": 8,
          "O.RESOURCE_SHARE": 7,
          "O.REUSE": 9,
          "O.ROLES": 10,
          "O.ROLE_MNG": 7,
          "O.SELF_TEST": 8
        },
        "OE": {
          "OE.ACCOUNTABLE": 11,
          "OE.AUDIT": 13,
          "OE.ID_AUTH": 8,
          "OE.NETWORK": 17,
          "OE.PHYSICAL": 1,
          "OE.TRAF_SEPARATION": 11
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 10,
          "ACM_AUT.1.1": 1,
          "ACM_CAP.3": 1,
          "ACM_CAP.4": 20,
          "ACM_SCP.2": 7
        },
        "ADO": {
          "ADO_DEL.1": 1,
          "ADO_DEL.2": 11,
          "ADO_IGS.1": 13
        },
        "ADV": {
          "ADV_DVS.1": 1,
          "ADV_FSP.1": 7,
          "ADV_FSP.2": 12,
          "ADV_HLD.1": 2,
          "ADV_HLD.2": 17,
          "ADV_IMP.1": 11,
          "ADV_LLD.1": 18,
          "ADV_RCR.1": 9,
          "ADV_SPM.1": 15
        },
        "AGD": {
          "AGD_ADM.1": 22,
          "AGD_USR.1": 16
        },
        "ALC": {
          "ALC_DVS.1": 9,
          "ALC_LCD.1": 9,
          "ALC_TAT.1": 6
        },
        "ATE": {
          "ATE_COV.2": 8,
          "ATE_DPT.1": 7,
          "ATE_FUN.1": 15,
          "ATE_IND.2": 10
        },
        "AVA": {
          "AVA_MSU.2": 15,
          "AVA_SOF.1": 10,
          "AVA_VLA.2": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 8
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 9,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 33,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.2": 16,
          "FAU_GEN.2.1": 1,
          "FAU_SAA.1": 8,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR.1": 20,
          "FAU_SAR.2": 15,
          "FAU_STG.1": 21,
          "FAU_STG.3": 15,
          "FAU_STG.4": 9
        },
        "FDP": {
          "FDP_ACC.1": 11,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 10,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ETC.2": 10,
          "FDP_ETC.2.1": 1,
          "FDP_ETC.2.2": 1,
          "FDP_ETC.2.3": 1,
          "FDP_ETC.2.4": 1,
          "FDP_IFC.1": 4,
          "FDP_IFC.2": 9,
          "FDP_IFC.2.1": 1,
          "FDP_IFC.2.2": 1,
          "FDP_IFF.2": 10,
          "FDP_IFF.2.1": 1,
          "FDP_IFF.2.2": 2,
          "FDP_IFF.2.3": 1,
          "FDP_IFF.2.4": 1,
          "FDP_IFF.2.5": 1,
          "FDP_IFF.2.6": 1,
          "FDP_IFF.2.7": 1,
          "FDP_ITC.2": 10,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 1,
          "FDP_ITT.1": 5,
          "FDP_ITT.1.1": 1,
          "FDP_RIP.2": 9,
          "FDP_RIP.2.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 11,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.2": 17,
          "FIA_UAU.2.1": 2,
          "FIA_UAU.5": 9,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID.1": 4,
          "FIA_UID.2": 24,
          "FIA_USB.1": 13,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA.1": 10,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 12,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT.1": 2,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 5,
          "FPT_ITT.1.1": 1,
          "FPT_RCV.1": 8,
          "FPT_RCV.1.1": 1,
          "FPT_RCV.2": 11,
          "FPT_RCV.2.1": 1,
          "FPT_RCV.2.2": 1,
          "FPT_RCV.4": 9,
          "FPT_RCV.4.1": 1,
          "FPT_RVM.1": 9,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.3": 10,
          "FPT_SEP.3.1": 1,
          "FPT_SEP.3.2": 1,
          "FPT_SEP.3.3": 1,
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1,
          "FPT_TDC.1": 14,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TSE.1": 1,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 8,
          "FTA_SSL.3.1": 1,
          "FTA_TSE.1": 19
        },
        "FTP": {
          "FTP_ITC.1": 2,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 74
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1
        },
        "ISO": {
          "ISO/IEC 15408": 10
        },
        "RFC": {
          "RFC 2156": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Thales Norway AS",
      "/CreationDate": "D:20090430154245+02\u002700\u0027",
      "/Creator": "PDFCreator Version 0.9.3",
      "/Keywords": "",
      "/ModDate": "D:20090430154245",
      "/Producer": "AFPL Ghostscript 8.13",
      "/Subject": "",
      "/Title": "XOmail Version 14.2 Security Target ed 10-public",
      "pdf_file_size_bytes": 2346280,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 111
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/20100223_SERTIT-008CR_issue201.0.pdf",
  "scheme": "NO",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "9e16b403f88963dd417e3bcd95f2bc133daebe222762d13fa0f4292d928638d4",
    "report_txt_hash": "9864510986169b3cc696235ffd45bfc1a79b56bff38ec0c23cec8d6ea4cbb898",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "974ccae11131e18df0b2ce17b82d56f0059de9e51bccd55afc4a85d7af4225e5",
    "st_txt_hash": "593bab6babc6547a7f1912678f0c9470914d6346a5670749076f40dc0420b2af"
  },
  "status": "archived"
}