Q1 Labs QRadar Release 7.0.0i

CSV information ?

Status archived
Valid from 10.02.2011
Valid until 31.12.2014
Scheme 🇺🇸 US
Manufacturer Q1 Labs, Inc.
Category Detection Devices and Systems
Security level ALC_FLR.2, EAL3+
Maintenance updates QRadar Release 7.0 Maintenance Release 5 (20.11.2012) Certification report

Heuristics summary ?

Certificate ID: CCEVS-VR-VID10419-2011

Certification report ?

Extracted keywords

Protocols
SSH

Vendor
Cisco

Security level
EAL3, EAL3 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
CCEVS-VR-VID10419-2011
Evaluation facilities
Booz Allen Hamilton

Side-channel analysis
malfunction

File metadata

Title: CCEVS-VR-VID10419-2011
Author: sbhoffm
Creation date: D:20110303161908-05'00'
Modification date: D:20110303161908-05'00'
Pages: 29
Creator: PDFCreator Version 0.9.8
Producer: GPL Ghostscript 8.64

Frontpage

Certificate ID: CCEVS-VR-VID10419-2011
Certified item: Q1 Labs, Inc. QRadar Release 7.0.0
Certification lab: US NIAP

References

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Hash functions
MD5
Schemes
MAC
Protocols
SSH, SSL
Libraries
OpenSSL
Block cipher modes
CBC

Vendor
Cisco

Security level
EAL3, EAL2, EAL3 augmented
Claims
O.PROTCT, O.IDSCAN, O.IDSENS, O.IDANLZ, O.RESPON, O.EADMIN, O.ACCESS, O.IDAUTH, O.OFLOWS, O.AUDITS, O.INTEGR, O.EXPORT, O.EAVESDROPPING, T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.EAVESDROPPING, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, A.ACCESS, A.DYNMIC, A.ASCOPE, A.MANAGE, A.NOEVIL, A.NOTRST, A.PROTCT, A.LOCATE, OE.AUDIT_PROTECTION, OE.AUDIT_SORT, OE.TIME, OE.INSTAL, OE.PHYCAL, OE.CREDEN, OE.PERSON, OE.INTROP, OE.KEYDESTRUCT, OE.KEYDES
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_FLR.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.2, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FCS_CKM.1, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FIA_UAU.1, FIA_ATD.1, FIA_UID.1, FIA_AFL.1, FIA_UAU, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MTD.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FPT_STM.1, FPT_ITA.1, FPT_ITC.1, FPT_ITI.1, FPT_ITA.1.1, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_STM.1.1, FPT_TRP.1, FPT_ITI, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Evaluation facilities
Booz Allen Hamilton

Side-channel analysis
malfunction

Standards
RFC 4432, RFC 3602, RFC 4253, CCMB-2009-07-004

File metadata

Title: Booz_Allen_Q1_QRadar_ST
Author: sbhoffm
Creation date: D:20110303162132-05'00'
Modification date: D:20110303162132-05'00'
Pages: 118
Creator: PDFCreator Version 0.9.8
Producer: GPL Ghostscript 8.64

References

Heuristics ?

Certificate ID: CCEVS-VR-VID10419-2011

Extracted SARs

ASE_OBJ.2, ASE_TSS.1, ALC_FLR.2, ADV_ARC.1, ALC_DEL.1, ALC_CMC.3, ALC_DVS.1, ADV_FSP.3, ASE_REQ.2, ATE_FUN.1, AVA_VAN.2, ATE_COV.2, ASE_CCL.1, ATE_DPT.1, ASE_ECD.1, AGD_OPE.1, ADV_TDS.2, AGD_PRE.1, ASE_SPD.1, ATE_IND.2, ASE_INT.1, ALC_CMS.3, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Q1 Labs QRadar Release 7.0.0i was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {'cert_id': 'CCEVS-VR-VID10419-2011', 'cert_item': 'Q1 Labs, Inc. QRadar Release 7.0.0', 'cert_lab': 'US NIAP'}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['7.0.0']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to ['US'].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '8d07cf7ec7d05260b774e9b00409b4b45a07c6a57ff269674afce78a50020f06', 'st_pdf_hash': 'f5e3150690807925e67542eaee62e3c06b9d09a6f5b144a761a909c23ef10e7c', 'report_txt_hash': '28f9da84353e6a230e33659af32b28efae9dc599d8eed7b881d1d55f290f9849', 'st_txt_hash': '871f8867b5f3c92f1f2a1b04f78c6f015308ac0c70dede0805f72dfe3639e9ed'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'malfunction': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 5, 'DES': 2}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'MD5': 2}, 'rules_crypto_schemes': {'MAC': 11, 'SSL': 5}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'malfunction': 2}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10419-2011': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 5, 'EAL3 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BoozAllenHamilton': {'Booz Allen Hamilton': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'KA': 1}}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 11, 'EAL2': 1, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 48, 'ADV_FSP.3': 3, 'ADV_TDS.2': 3}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 3}, 'ALC': {'ALC_CMC.3': 3, 'ALC_CMS.3': 3, 'ALC_DEL.1': 3, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3, 'ALC_FLR.2': 4}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.1': 3, 'ATE_FUN.1': 3, 'ATE_IND.2': 3}, 'AVA': {'AVA_VAN.2': 3}, 'ASE': {'ASE_CCL.1': 3, 'ASE_ECD.1': 3, 'ASE_INT.1': 3, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 3}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 21, 'FAU_SAR.1': 13, 'FAU_SAR.2': 29, 'FAU_SAR.3': 11, 'FAU_SEL.1': 19, 'FAU_STG.2': 49, 'FAU_STG.4': 19, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 2}, 'FCS': {'FCS_CKM.1': 12, 'FCS_COP.1': 12, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.4': 5, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ITC.1': 1, 'FDP_ITC.2': 1}, 'FIA': {'FIA_UAU.1': 28, 'FIA_ATD.1': 18, 'FIA_UID.1': 29, 'FIA_AFL.1': 36, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 36, 'FMT_MTD.1': 195, 'FMT_SMR.1': 25, 'FMT_SMF.1': 44, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 5, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_STM.1': 21, 'FPT_ITA.1': 7, 'FPT_ITC.1': 21, 'FPT_ITI.1': 16, 'FPT_ITA.1.1': 1, 'FPT_ITC.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TRP.1': 1, 'FPT_ITI': 1}, 'FTP': {'FTP_TRP.1': 8, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.PROTCT': 14, 'O.IDSCAN': 14, 'O.IDSENS': 17, 'O.IDANLZ': 11, 'O.RESPON': 4, 'O.EADMIN': 6, 'O.ACCESS': 18, 'O.IDAUTH': 28, 'O.OFLOWS': 6, 'O.AUDITS': 17, 'O.INTEGR': 8, 'O.EXPORT': 4, 'O.EAVESDROPPING': 5}, 'T': {'T.COMINT': 2, 'T.COMDIS': 2, 'T.LOSSOF': 2, 'T.NOHALT': 2, 'T.PRIVIL': 2, 'T.IMPCON': 2, 'T.INFLUX': 2, 'T.FACCNT': 2, 'T.EAVESDROPPING': 6, 'T.SCNCFG': 2, 'T.SCNMLC': 2, 'T.SCNVUL': 2, 'T.FALACT': 2, 'T.FALREC': 2, 'T.FALASC': 2, 'T.MISUSE': 2, 'T.INADVE': 2, 'T.MISACT': 2}, 'A': {'A.ACCESS': 2, 'A.DYNMIC': 2, 'A.ASCOPE': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.NOTRST': 2, 'A.PROTCT': 2, 'A.LOCATE': 2}, 'OE': {'OE': 5, 'OE.AUDIT_PROTECTION': 4, 'OE.AUDIT_SORT': 4, 'OE.TIME': 6, 'OE.INSTAL': 7, 'OE.PHYCAL': 6, 'OE.CREDEN': 7, 'OE.PERSON': 8, 'OE.INTROP': 7, 'OE.KEYDESTRUCT': 3, 'OE.KEYDES': 2}}, 'vendor': {'STMicroelectronics': {'STM': 22}}, 'eval_facility': {'BoozAllenHamilton': {'Booz Allen Hamilton': 120}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 11}, 'KA': {'KA': 2}}, 'crypto_protocol': {'SSH': {'SSH': 22}, 'TLS': {'SSL': {'SSL': 5}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 4}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 4432': 1, 'RFC 3602': 1, 'RFC 4253': 3}, 'CC': {'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2012-11-20', 'maintenance_title': 'QRadar Release 7.0 Maintenance Release 5', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/st_vid10419-add1.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'st_vid10419-vr.pdf', 'st_filename': 'st_vid10419-st.pdf'}.
    • The report_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 3}}}}, 'crypto_scheme': {}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 1}}}, '__delete__': ['TLS']}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL3': 14}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 57, 'ADV_FSP.3': 14, 'ADV_TDS.2': 15}}, 'AGD': {'__update__': {'AGD_OPE.1': 12, 'AGD_PRE.1': 8}}, 'ALC': {'__update__': {'ALC_CMC.3': 15, 'ALC_CMS.3': 8, 'ALC_DEL.1': 7, 'ALC_DVS.1': 8, 'ALC_LCD.1': 8, 'ALC_FLR.2': 19}}, 'ATE': {'__update__': {'ATE_COV.2': 7, 'ATE_DPT.1': 7, 'ATE_FUN.1': 10, 'ATE_IND.2': 9}}, 'AVA': {'__update__': {'AVA_VAN.2': 9}}, 'ASE': {'__update__': {'ASE_CCL.1': 13, 'ASE_ECD.1': 12, 'ASE_INT.1': 14, 'ASE_OBJ.2': 12, 'ASE_REQ.2': 15, 'ASE_SPD.1': 9, 'ASE_TSS.1': 7}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 18, 'FAU_SAR.1': 11, 'FAU_STG.2': 48}}, 'FCS': {'__update__': {'FCS_CKM.1': 11, 'FCS_COP.1': 11}}, 'FIA': {'__insert__': {'FIA_UAU': 1}, '__update__': {'FIA_UID.1': 28}}, 'FMT': {'__update__': {'FMT_SMR.1': 23}}}}, 'cc_claims': {'__update__': {'OE': {'__delete__': ['OE']}}}, 'vendor': {}, 'eval_facility': {'__update__': {'BoozAllenHamilton': {'__update__': {'Booz Allen Hamilton': 3}}}}, 'symmetric_crypto': {'__delete__': ['DES']}, 'hash_function': {'__update__': {'MD': {'__update__': {'MD5': {'__update__': {'MD5': 1}}}}}}, 'crypto_scheme': {'__delete__': ['KA']}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 9}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 1}}}}}}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 6}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'RFC': {'__update__': {'RFC 4432': 2, 'RFC 3602': 2}}}}} data.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'vendor': {'Cisco': {'Cisco': 4}}} data.
    • The st_keywords property was updated, with the {'vendor': {'Cisco': {'Cisco': 5}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Detection Devices and Systems",
  "cert_link": null,
  "dgst": "42b136e8d10b2c42",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "CCEVS-VR-VID10419-2011",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.0.0"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
        "maintenance_date": "2012-11-20",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10419-add1.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "QRadar Release 7.0 Maintenance Release 5"
      }
    ]
  },
  "manufacturer": "Q1 Labs, Inc.",
  "manufacturer_web": "https://www.q1labs.com",
  "name": "Q1 Labs QRadar Release 7.0.0i",
  "not_valid_after": "2014-12-31",
  "not_valid_before": "2011-02-10",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "st_vid10419-vr.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {
        "cert_id": "CCEVS-VR-VID10419-2011",
        "cert_item": "Q1 Labs, Inc. QRadar Release 7.0.0",
        "cert_lab": "US NIAP"
      },
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10419-2011": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 5,
          "EAL3 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BoozAllenHamilton": {
          "Booz Allen Hamilton": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "sbhoffm",
      "/CreationDate": "D:20110303161908-05\u002700\u0027",
      "/Creator": "PDFCreator Version 0.9.8",
      "/Keywords": "",
      "/ModDate": "D:20110303161908-05\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.64",
      "/Subject": "",
      "/Title": "CCEVS-VR-VID10419-2011",
      "pdf_file_size_bytes": 236301,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "st_vid10419-st.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 2,
          "A.ASCOPE": 2,
          "A.DYNMIC": 2,
          "A.LOCATE": 2,
          "A.MANAGE": 2,
          "A.NOEVIL": 2,
          "A.NOTRST": 2,
          "A.PROTCT": 2
        },
        "O": {
          "O.ACCESS": 18,
          "O.AUDITS": 17,
          "O.EADMIN": 6,
          "O.EAVESDROPPING": 5,
          "O.EXPORT": 4,
          "O.IDANLZ": 11,
          "O.IDAUTH": 28,
          "O.IDSCAN": 14,
          "O.IDSENS": 17,
          "O.INTEGR": 8,
          "O.OFLOWS": 6,
          "O.PROTCT": 14,
          "O.RESPON": 4
        },
        "OE": {
          "OE.AUDIT_PROTECTION": 4,
          "OE.AUDIT_SORT": 4,
          "OE.CREDEN": 7,
          "OE.INSTAL": 7,
          "OE.INTROP": 7,
          "OE.KEYDES": 2,
          "OE.KEYDESTRUCT": 3,
          "OE.PERSON": 8,
          "OE.PHYCAL": 6,
          "OE.TIME": 6
        },
        "T": {
          "T.COMDIS": 2,
          "T.COMINT": 2,
          "T.EAVESDROPPING": 6,
          "T.FACCNT": 2,
          "T.FALACT": 2,
          "T.FALASC": 2,
          "T.FALREC": 2,
          "T.IMPCON": 2,
          "T.INADVE": 2,
          "T.INFLUX": 2,
          "T.LOSSOF": 2,
          "T.MISACT": 2,
          "T.MISUSE": 2,
          "T.NOHALT": 2,
          "T.PRIVIL": 2,
          "T.SCNCFG": 2,
          "T.SCNMLC": 2,
          "T.SCNVUL": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 57,
          "ADV_FSP.3": 14,
          "ADV_TDS.2": 15
        },
        "AGD": {
          "AGD_OPE.1": 12,
          "AGD_PRE.1": 8
        },
        "ALC": {
          "ALC_CMC.3": 15,
          "ALC_CMS.3": 8,
          "ALC_DEL.1": 7,
          "ALC_DVS.1": 8,
          "ALC_FLR.2": 19,
          "ALC_LCD.1": 8
        },
        "ASE": {
          "ASE_CCL.1": 13,
          "ASE_ECD.1": 12,
          "ASE_INT.1": 14,
          "ASE_OBJ.2": 12,
          "ASE_REQ.2": 15,
          "ASE_SPD.1": 9,
          "ASE_TSS.1": 7
        },
        "ATE": {
          "ATE_COV.2": 7,
          "ATE_DPT.1": 7,
          "ATE_FUN.1": 10,
          "ATE_IND.2": 9
        },
        "AVA": {
          "AVA_VAN.2": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL3": 14,
          "EAL3 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 18,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2,
          "FAU_SAR.1": 11,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 29,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 11,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 19,
          "FAU_SEL.1.1": 1,
          "FAU_STG.2": 48,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.4": 19,
          "FAU_STG.4.1": 2
        },
        "FCS": {
          "FCS_CKM.1": 11,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 5,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ITC.1": 1,
          "FDP_ITC.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 36,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 18,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 28,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 28,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 36,
          "FMT_MOF.1.1": 1,
          "FMT_MTD.1": 195,
          "FMT_MTD.1.1": 5,
          "FMT_SMF.1": 44,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 23,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITA.1": 7,
          "FPT_ITA.1.1": 1,
          "FPT_ITC.1": 21,
          "FPT_ITC.1.1": 1,
          "FPT_ITI": 1,
          "FPT_ITI.1": 16,
          "FPT_ITI.1.1": 1,
          "FPT_ITI.1.2": 1,
          "FPT_STM.1": 21,
          "FPT_STM.1.1": 1,
          "FPT_TRP.1": 1
        },
        "FTP": {
          "FTP_TRP.1": 8,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 6
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 9
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 11
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BoozAllenHamilton": {
          "Booz Allen Hamilton": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2009-07-004": 1
        },
        "RFC": {
          "RFC 3602": 2,
          "RFC 4253": 3,
          "RFC 4432": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 5
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "sbhoffm",
      "/CreationDate": "D:20110303162132-05\u002700\u0027",
      "/Creator": "PDFCreator Version 0.9.8",
      "/Keywords": "",
      "/ModDate": "D:20110303162132-05\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.64",
      "/Subject": "",
      "/Title": "Booz_Allen_Q1_QRadar_ST",
      "pdf_file_size_bytes": 769431,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 118
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10419-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10419-st.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "8d07cf7ec7d05260b774e9b00409b4b45a07c6a57ff269674afce78a50020f06",
    "report_txt_hash": "28f9da84353e6a230e33659af32b28efae9dc599d8eed7b881d1d55f290f9849",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "f5e3150690807925e67542eaee62e3c06b9d09a6f5b144a761a909c23ef10e7c",
    "st_txt_hash": "871f8867b5f3c92f1f2a1b04f78c6f015308ac0c70dede0805f72dfe3639e9ed"
  },
  "status": "archived"
}