Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647

CSV information ?

Status active
Valid from 03.01.2021
Valid until 03.01.2026
Scheme 🇪🇸 ES
Manufacturer Huawei Technologies Co. Ltd.
Category Databases
Security level EAL2+, ALC_FLR.2
Protection profiles

Heuristics summary ?

Certificate ID: 2019-20-INF-3379

Certification report ?

Extracted keywords

Hash functions
SHA-256

Vendor
Huawei, Huawei Technologies Co

Security level
EAL2, EAL 1, EAL 4, EAL 2, ITSEC Evaluation
Claims
A.U
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, AGD_PRE, AGD_OPE, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FPT_TRC.1, FTA_MCS.1, FTA_TSE.1
Protection profiles
BSI-CC-PP-0088-V2
Certificates
2019-20-INF-3379-v1
Evaluation facilities
DEKRA Testing and Certification

File metadata

Creation date: D:20210203130801+01'00'
Modification date: D:20210203130801+01'00'
Pages: 15
Creator: Microsoft® Word 2016
Producer: Microsoft® Word 2016

References

Security target ?

Extracted keywords

Hash functions
SHA256

Trusted Execution Environments
SE
Vendor
Huawei, Huawei Technologies Co

Security level
EAL 2
Claims
O.ADMIN_ROLE, O.AUDIT, O.DISCRETIONARY, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORMATION, O.TOE_ACCESS, O.AUDIT_GENERATION, O.RESIDUAL, O.TOE_ACCE, O.ADMIN_RO, O.DISCRETIO, O.DISCRETIONARY_ACCESS, O.RESIDUAL_, O.AUDIT_GE, O.DISCRETI, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, T.ACCESS_T, T.IA_MASQU, T.RESIDUAL, T.TSF_COMP, T.UNAUTHO, T.TSF, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, A.AUTHUSE, A.NO_GENER, A.PEER_FUN, A.TRAINED-, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED, OE.IT_TRUSTED_SYSTEM, OE.NO_GENE, OE.NO_GENERAL, OE.INFO, OE.IT_REMOT, OE.IT_TRUST, OE.INFO_PRO, OSP
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FAU_MTD.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FIA_USB.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_REV.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_MSA.1.1, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_STM.1, FPT_ITT.1, FTA_MCS.1, FTA_TSE.1, FTA_TSE.1.1, FTA_MCS.1.1
Protection profiles
BSI-CC-PP-0088-V2
Certification process
out of scope, at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE, EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE, IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores, at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that, 0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not, in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not

Certification process
out of scope, at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE, EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE, IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores, at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that, 0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not, in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not

References

Heuristics ?

Certificate ID: 2019-20-INF-3379

Extracted SARs

ASE_OBJ.2, ADV_TDS.1, ASE_TSS.1, ALC_FLR.2, ADV_ARC.1, ALC_DEL.1, ASE_REQ.2, ATE_FUN.1, ADV_FSP.2, AVA_VAN.2, ASE_CCL.1, ALC_CMC.2, ASE_ECD.1, AGD_OPE.1, ATE_COV.1, AGD_PRE.1, ALC_CMS.2, ASE_SPD.1, ATE_IND.2, ASE_INT.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647 was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ["Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: 'NoneType' object has no attribute 'items'", "Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: 'NoneType' object has no attribute 'items'"].

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'2019-20-INF-3379-v1': 1}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['100']}.
    • The cert_id property was set to 2019-20-INF-3379.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '1350af3a2061b9adbd165531f295f29c6fcb74dd7547538f80192f5dedcadbd0', 'st_pdf_hash': '51c62c983bc5f321ec3bc03f90579bbbeb6053bf54913cfac0ad8106aa4655cf', 'report_txt_hash': '80c5162f24d0e5aa9817d107d75ebe4b0ba69e13298926bb3dd1f4c8a9b0ee0c', 'st_txt_hash': '3237f13b0c645a8517c2e3e464edd91f49e2fb7e5c6619d9f88dda20dae0c937'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_vendor': {'Huawei': 27}} data.
    • The st_keywords property was updated, with the {'rules_vendor': {'Huawei': 160}} data.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: PDF metadata unavailable', 'Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: PDF metadata unavailable'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'https://www.sogis.org/']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'ES': {'2019-20-INF-3379-v1': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 4}}, 'cc_security_level': {'EAL': {'EAL2': 8, 'EAL 1': 1, 'EAL 4': 2, 'EAL 2': 1}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'AGD': {'AGD_PRE': 4, 'AGD_OPE': 1}, 'ALC': {'ALC_FLR.2': 6, 'ALC_FLR': 2}}, 'cc_sfr': {'FMT': {'FMT_REV.1': 2}}, 'cc_claims': {'A': {'A.U': 5}}, 'vendor': {'Huawei': {'Huawei': 24, 'Huawei Technologies Co': 3}}, 'eval_facility': {'DEKRA': {'DEKRA Testing and Certification': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 3}}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1, 'ALC_FLR.2': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 13, 'FAU_GEN.2': 9, 'FAU_SEL.1': 9, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 2, 'FAU_SEL.1.1': 2, 'FAU_MTD.1': 2}, 'FDP': {'FDP_ACC.1': 19, 'FDP_ACF.1': 17, 'FDP_RIP.1': 9, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 2, 'FDP_IFC.1': 1}, 'FIA': {'FIA_USB.1': 4, 'FIA_ATD.1': 15, 'FIA_UAU.1': 8, 'FIA_UID.1': 16, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2}, 'FMT': {'FMT_MOF.1': 9, 'FMT_MSA.1': 11, 'FMT_MSA.3': 11, 'FMT_MTD.1': 9, 'FMT_SMF.1': 15, 'FMT_SMR.1': 23, 'FMT_REV.1': 13, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_REV.1.1': 4, 'FMT_REV.1.2': 4, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1}, 'FPT': {'FPT_TRC.1': 10, 'FPT_TRC.1.1': 2, 'FPT_TRC.1.2': 2, 'FPT_STM.1': 1, 'FPT_ITT.1': 2}, 'FTA': {'FTA_MCS.1': 9, 'FTA_TSE.1': 8, 'FTA_TSE.1.1': 2, 'FTA_MCS.1.1': 1, 'FTA_MCS.1.2': 1}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 7, 'O.AUDIT': 4, 'O.DISCRETIONARY': 2, 'O.MANAGE': 13, 'O.MEDIATE': 11, 'O.RESIDUAL_INFORMATION': 7, 'O.TOE_ACCESS': 12, 'O.AUDIT_GENERATION': 3, 'O.RESIDUAL': 3, 'O.TOE_ACCE': 9, 'O.ADMIN_RO': 4, 'O.DISCRETIO': 2, 'O.DISCRETIONARY_ACCESS': 4, 'O.RESIDUAL_': 1, 'O.AUDIT_GE': 2, 'O.DISCRETI': 1}, 'T': {'T.ACCESS_TSFDATA': 3, 'T.ACCESS_TSFFUNC': 3, 'T.IA_MASQUERADE': 3, 'T.IA_USER': 4, 'T.RESIDUAL_DATA': 3, 'T.TSF_COMPROMISE': 3, 'T.UNAUTHORIZED_ACCESS': 3, 'T.ACCESS_T': 2, 'T.IA_MASQU': 2, 'T.RESIDUAL': 1, 'T.TSF_COMP': 1, 'T.UNAUTHO': 2, 'T.TSF': 1}, 'A': {'A.PHYSICAL': 4, 'A.AUTHUSER': 3, 'A.MANAGE': 4, 'A.TRAINEDUSER': 3, 'A.NO_GENERAL_PURPOSE': 3, 'A.SUPPORT': 5, 'A.CONNECT': 5, 'A.AUTHUSE': 1, 'A.NO_GENER': 1, 'A.PEER_FUN': 1, 'A.TRAINED-': 1}, 'OE': {'OE.ADMIN': 10, 'OE.INFO_PROTECT': 11, 'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 8, 'OE.IT_REMOTE': 6, 'OE.IT_TRUSTED': 1, 'OE.IT_TRUSTED_SYSTEM': 5, 'OE.NO_GENE': 3, 'OE.NO_GENERAL': 2, 'OE.INFO': 5, 'OE.IT_REMOT': 4, 'OE.IT_TRUST': 4, 'OE.INFO_PRO': 4}}, 'vendor': {'STMicroelectronics': {'STM': 1}, 'Huawei': {'Huawei': 80, 'Huawei Technologies Co': 80}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 18}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 6, '(at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE': 1, '.0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE': 1, '.7.5 is also out of scope and thus not included in the TOE': 1, '.73 is also out of scope and thus not included in the TOE': 1, '.3.7 is also out of scope and thus not included in the TOE': 1, ', IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores': 1, '(at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that': 1, '0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not': 1, 'included in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was updated.

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '2019-20-INF-3379.pdf', 'st_filename': '2019-20_ST.pdf'}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_sar': {'__insert__': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, '__update__': {'AGD': {'__insert__': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, '__update__': {'AGD_PRE': 2}}, 'ALC': {'__insert__': {'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, '__update__': {'ALC_FLR.2': 8}}}}, 'cc_sfr': {'__insert__': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.2': 1, 'FAU_SEL.1': 1}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_RIP.1': 1}, 'FIA': {'FIA_ATD.1': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FPT': {'FPT_TRC.1': 1}, 'FTA': {'FTA_MCS.1': 1, 'FTA_TSE.1': 1}}, '__update__': {'FMT': {'__insert__': {'FMT_MOF.1': 1, 'FMT_MSA.1': 1, 'FMT_MSA.3': 1, 'FMT_MTD.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1}}}}, 'tee_name': {}} data.
    • The st_keywords property was set to None.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

    The PDF extraction data was updated.

    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 3}}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 2, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 11, 'FAU_GEN.2': 9, 'FAU_SEL.1': 9, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 2, 'FAU_SEL.1.1': 2, 'FAU_MTD.1': 2}, 'FDP': {'FDP_ACC.1': 18, 'FDP_ACF.1': 16, 'FDP_RIP.1': 9, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 2, 'FDP_IFC.1': 1}, 'FIA': {'FIA_USB.1': 5, 'FIA_ATD.1': 15, 'FIA_UAU.1': 8, 'FIA_UID.1': 14, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 9, 'FMT_MSA.1': 10, 'FMT_MSA.3': 10, 'FMT_MTD.1': 8, 'FMT_SMF.1': 14, 'FMT_SMR.1': 20, 'FMT_REV.1': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_REV.1.1': 4, 'FMT_REV.1.2': 4, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1}, 'FPT': {'FPT_TRC.1': 10, 'FPT_TRC.1.1': 2, 'FPT_TRC.1.2': 2, 'FPT_STM.1': 1, 'FPT_ITT.1': 1}, 'FTA': {'FTA_MCS.1': 9, 'FTA_TSE.1': 8, 'FTA_TSE.1.1': 2, 'FTA_MCS.1.1': 1}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 7, 'O.AUDIT': 2, 'O.DISCRETIONARY': 2, 'O.MANAGE': 13, 'O.MEDIATE': 9, 'O.RESIDUAL_INFORMATION': 7, 'O.TOE_ACCESS': 10, 'O.AUDIT_GENERATION': 3, 'O.RESIDUAL': 3, 'O.TOE_ACCE': 9, 'O.ADMIN_RO': 4, 'O.DISCRETIO': 2, 'O.DISCRETIONARY_ACCESS': 4, 'O.RESIDUAL_': 1, 'O.AUDIT_GE': 2, 'O.DISCRETI': 1}, 'T': {'T.ACCESS_TSFDATA': 3, 'T.ACCESS_TSFFUNC': 1, 'T.IA_MASQUERADE': 3, 'T.IA_USER': 2, 'T.RESIDUAL_DATA': 3, 'T.TSF_COMPROMISE': 1, 'T.UNAUTHORIZED_ACCESS': 3, 'T.ACCESS_T': 2, 'T.IA_MASQU': 2, 'T.RESIDUAL': 1, 'T.TSF_COMP': 1, 'T.UNAUTHO': 2, 'T.TSF': 1}, 'A': {'A.PHYSICAL': 4, 'A.AUTHUSER': 1, 'A.MANAGE': 4, 'A.TRAINEDUSER': 1, 'A.NO_GENERAL_PURPOSE': 3, 'A.SUPPORT': 5, 'A.CONNECT': 3, 'A.AUTHUSE': 1, 'A.NO_GENER': 1, 'A.PEER_FUN': 1, 'A.TRAINED-': 1}, 'OE': {'OE.ADMIN': 10, 'OE.INFO_PROTECT': 11, 'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 8, 'OE.IT_REMOTE': 6, 'OE.IT_TRUSTED': 1, 'OE.IT_TRUSTED_SYSTEM': 5, 'OE.NO_GENE': 3, 'OE.NO_GENERAL': 2, 'OE.INFO': 5, 'OE.IT_REMOT': 4, 'OE.IT_TRUST': 4, 'OE.INFO_PRO': 4}, 'OSP': {'OSP': 1}}, 'vendor': {'Huawei': {'Huawei': 80, 'Huawei Technologies Co': 80}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 6, 'at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE': 1, 'EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE': 1, 'IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores': 1, 'at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that': 1, '0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not': 1, 'in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not': 1}}}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Databases",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/2019-20_Certificate.pdf",
  "dgst": "5af5a1b535422b51",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "2019-20-INF-3379",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "100"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Huawei Technologies Co. Ltd.",
  "manufacturer_web": "https://www.huawei.com",
  "name": "Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647",
  "not_valid_after": "2026-01-03",
  "not_valid_before": "2021-01-03",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "2019-20-INF-3379.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "ES": {
          "2019-20-INF-3379-v1": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.U": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0088-V2": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 2,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR": 2,
          "ALC_FLR.2": 8
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 8
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.2": 1,
          "FAU_SEL.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_REV.1": 2,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_TRC.1": 1
        },
        "FTA": {
          "FTA_MCS.1": 1,
          "FTA_TSE.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "DEKRA": {
          "DEKRA Testing and Certification": 5
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 24,
          "Huawei Technologies Co": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20210203130801+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20210203130801+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 967323,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.sogis.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "2019-20_ST.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.AUTHUSE": 1,
          "A.AUTHUSER": 1,
          "A.CONNECT": 3,
          "A.MANAGE": 4,
          "A.NO_GENER": 1,
          "A.NO_GENERAL_PURPOSE": 3,
          "A.PEER_FUN": 1,
          "A.PHYSICAL": 4,
          "A.SUPPORT": 5,
          "A.TRAINED-": 1,
          "A.TRAINEDUSER": 1
        },
        "O": {
          "O.ADMIN_RO": 4,
          "O.ADMIN_ROLE": 7,
          "O.AUDIT": 2,
          "O.AUDIT_GE": 2,
          "O.AUDIT_GENERATION": 3,
          "O.DISCRETI": 1,
          "O.DISCRETIO": 2,
          "O.DISCRETIONARY": 2,
          "O.DISCRETIONARY_ACCESS": 4,
          "O.MANAGE": 13,
          "O.MEDIATE": 9,
          "O.RESIDUAL": 3,
          "O.RESIDUAL_": 1,
          "O.RESIDUAL_INFORMATION": 7,
          "O.TOE_ACCE": 9,
          "O.TOE_ACCESS": 10
        },
        "OE": {
          "OE.ADMIN": 10,
          "OE.INFO": 5,
          "OE.INFO_PRO": 4,
          "OE.INFO_PROTECT": 11,
          "OE.IT_REMOT": 4,
          "OE.IT_REMOTE": 6,
          "OE.IT_TRUST": 4,
          "OE.IT_TRUSTED": 1,
          "OE.IT_TRUSTED_SYSTEM": 5,
          "OE.NO_GENE": 3,
          "OE.NO_GENERAL": 2,
          "OE.NO_GENERAL_PURPOSE": 3,
          "OE.PHYSICAL": 8
        },
        "OSP": {
          "OSP": 1
        },
        "T": {
          "T.ACCESS_T": 2,
          "T.ACCESS_TSFDATA": 3,
          "T.ACCESS_TSFFUNC": 1,
          "T.IA_MASQU": 2,
          "T.IA_MASQUERADE": 3,
          "T.IA_USER": 2,
          "T.RESIDUAL": 1,
          "T.RESIDUAL_DATA": 3,
          "T.TSF": 1,
          "T.TSF_COMP": 1,
          "T.TSF_COMPROMISE": 1,
          "T.UNAUTHO": 2,
          "T.UNAUTHORIZED_ACCESS": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0088-V2": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 11,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2,
          "FAU_GEN.2": 9,
          "FAU_GEN.2.1": 2,
          "FAU_MTD.1": 2,
          "FAU_SEL.1": 9,
          "FAU_SEL.1.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 18,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 16,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 1,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 2
        },
        "FIA": {
          "FIA_ATD.1": 15,
          "FIA_ATD.1.1": 2,
          "FIA_UAU.1": 8,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 5
        },
        "FMT": {
          "FMT_MOF.1": 9,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 10,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 2,
          "FMT_REV.1": 11,
          "FMT_REV.1.1": 4,
          "FMT_REV.1.2": 4,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 20,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT.1": 1,
          "FPT_STM.1": 1,
          "FPT_TRC.1": 10,
          "FPT_TRC.1.1": 2,
          "FPT_TRC.1.2": 2
        },
        "FTA": {
          "FTA_MCS.1": 9,
          "FTA_MCS.1.1": 1,
          "FTA_TSE.1": 8,
          "FTA_TSE.1.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "0SP5 (EulerOS), x86_64 \u25cf EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not": 1,
          "EulerOS), x86_64 \u25cf EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE": 1,
          "IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: \u25cf CPU (higher than 4 cores": 1,
          "at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE": 1,
          "at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that": 1,
          "in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not": 1,
          "out of scope": 6
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 80,
          "Huawei Technologies Co": 80
        }
      },
      "vulnerability": {}
    },
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL2+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "DBMS_PPV2.12"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf",
        "pp_name": "Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/2019-20-INF-3379.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/2019-20_ST.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [
      "Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: PDF metadata unavailable"
    ],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "1350af3a2061b9adbd165531f295f29c6fcb74dd7547538f80192f5dedcadbd0",
    "report_txt_hash": "80c5162f24d0e5aa9817d107d75ebe4b0ba69e13298926bb3dd1f4c8a9b0ee0c",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": false,
    "st_pdf_hash": "51c62c983bc5f321ec3bc03f90579bbbeb6053bf54913cfac0ad8106aa4655cf",
    "st_txt_hash": "3237f13b0c645a8517c2e3e464edd91f49e2fb7e5c6619d9f88dda20dae0c937"
  },
  "status": "active"
}