Garcinia Firewall Router v21.1.0

CSV information ?

Status active
Valid from 29.06.2021
Valid until 29.06.2026
Scheme 🇲🇾 MY
Manufacturer Sigma Rectrix Systems (M) Sdn Bhd
Category Network and Network-Related Devices and Systems
Security level EAL2

Heuristics summary ?

Certificate ID: ISCB-5-RPT-C122-CR-v1

Certificate ?

Extracted keywords

Security level
EAL2

File metadata

Title: SISCB Print21070211330
Creation date: D:20210702113323+08'00'
Modification date: D:20210702114719+08'00'
Pages: 1
Creator: ISCB Printer
Producer: KONICA MINOLTA bizhub C360i

Certification report ?

Extracted keywords

Protocols
SSL, TLS v1.2, TLS v1.3, TLS

Security level
EAL2, EAL 2
Claims
A.NOEVIL, A.PHYSEC, A.SINGEN
Security Functional Requirements (SFR)
FAU_GEN.1, FDP_ACC.1, FIA_UAU.2, FIA_ATD.1, FIA_AFL.1, FMT_SMF.1, FMT_MTD.1, FMT_MOF.1, FPT_STM.1, FTP_TRP.1
Certificates
ISCB-5-RPT-C122-CR-v1

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Creation date: D:20210629084536Z00'00'
Modification date: D:20210629084536Z00'00'
Pages: 33
Creator: Word
Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext

References

No references.

Security target ?

Extracted keywords

Protocols
SSH, TLS v1.2, TLS v1.3, VPN

Vendor
STM, Microsoft

Security level
EAL2
Claims
O.ACCOUN, O.AUDREC, O.IDAUTH, O.MEDIAT, O.SECFUN, O.SECSTA, O.TOECOM, O.DATA_FLOW, T.AUDACC, T.AUDFUL, T.MEDIAT, T.NOAUTH, T.OLDINF, T.SELPRO, T.TOECOM, T.TUSAGE, T.MISUSE, A.NOEVIL, A.PHYSEC, A.SINGEN, OE.ADMTRA, OE.GUIDAN, OE.PHYSEC, OE.SINGEN
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1, ASE_ECD.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN, FAU_GEN.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FDP_ACC.1, FDP_ACF.1, FDP_IFF, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_AFL.1, FIA_UAU.2, FIA_UID.2, FIA_SOS.1, FIA_ATD.1.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FIA_SOS.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_STM.1.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

File metadata

Title: Garcinia Security Target
Author: Securelytics
Creation date: D:20210620173631+00'00'
Modification date: D:20210620173631+00'00'
Pages: 42
Creator: Microsoft Word

References

No references.

Heuristics ?

Certificate ID: ISCB-5-RPT-C122-CR-v1

Extracted SARs

ADV_ARC.1, ASE_OBJ.2, ADV_TDS.1, ASE_SPD.1, ALC_CMS.2, ASE_ECD.1, AVA_VAN.2, ASE_INT.1, ATE_IND.2, ATE_COV.1, ALC_CMC.2, ADV_FSP.2, ASE_TSS.1, ATE_FUN.1, ASE_REQ.2, AGD_PRE.1, ASE_CCL.1, AGD_OPE.1, ALC_DEL.1

Scheme data ?

Cert No 2016-002-C068
Developer Sigma Rectrix Systems (M) Sdn. Bhd.
Level EAL2
Product Garcinia Firewall Router v21.1.0
Certification Date 29-06-2021
Expiration Date 29-06-2026
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/105
Enhanced
Cert Id C068
Product Garcinia Firewall Router v21.1.0
Developer Suite 3-05, 4805 CBD Perdana 2Jalan Perdana Cyber 1263000 Cyberjaya Selangor Phone: +60383186696Email: sales@sigmarectrix.comWebsite: https://sigmarectrix.com
Category Network and Network-Related Devices and Systems
Type Network and Network-Related Devices and Systems
Scope The TOE is a firewall and routing platform which is a self-contained appliance consisting of hardware and firmware. The TOE is a product that manages the network from any congestion and harm. The TOE analyse the incoming and outgoing network traffic, loss and manipulation of data, business secrets and confidential of data leaks. Firewall are indeed important and everyone who is online must strive to have a firewall protection before it’s vulnerable to external and internal. The TOE core features include Traffic Shaper, Captive portal, Forward Caching Proxy, Virtual Private Network, High Availability & Hardware Failover, Intrusion Detection and Inline Prevention, Build-in reporting and monitoring tools, Support for plugins, DNS Server & DNS Forwarder, DHCP Server and Relay, Dynamic DNS, Backup & Restore, Stateful inspection firewall, Granular control over state table, 802.1Q VLAN support and many more.
Assurance Level EAL2
Certification Date 29-06-2021
Expiration Date 29-06-2026
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/Garcinia_Security_Target_v10.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/ISCB-5-RPT-C122-CR-v1.pdf
Status Valid

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '78035505e5f8130b5824e6653081158a8b93eed277f303e9c8875b29a07a4209', 'txt_hash': '2d126b1ceee81fb85faeb10e4a2a4e796c579c6d40344f9c67bd90cfa7e36106'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4a6944a16081259d071280c6a612aadf274edb77e7e1756bf6ce375a30e5a4ed', 'txt_hash': '5774a883851ddfc27594086a69c6e679f65b31ffa9911ead363b497b50af1094'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd25e4fbcd79ebddd0e58b7d7c330063739082765771db197237c3f751bdb4993', 'txt_hash': '031e6f720822be0a49e86b536a07e443e1cb19be9e592ca90436b2525997d791'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 83646, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20210702113323+08'00'", '/Creator': 'ISCB Printer', '/ModDate': "D:20210702114719+08'00'", '/Producer': 'KONICA MINOLTA bizhub C360i', '/Title': 'SISCB Print21070211330', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'ISCB-5-CERT-C122-CERTIFICATE-v1.pdf'}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'certification_date': '29-06-2021', 'product': 'Garcinia Firewall Router v21.1.0'} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'category': 'NETWORK AND NETWORK-RELATED DEVICES AND SYSTEMS', 'level': 'EAL2', 'cert_id': '2016-002-C068', 'certification_date': '29 June 2021', 'product': 'PROJECT IDC122ASSURANCE LEVELEAL2Security Target (ST)Certification Report (CR)PRODUCT NAME AND VERSIONGarcinia Firewall Router v21.1.0PRODUCT TYPENetwork and Network-Related Devices and SystemsPRODUCT SPONSOR / DEVELOPERSigma Rectrix Systems (M) Sdn. Bhd.PRODUCT SPONSOR / DEVELOPER CONTACT DETAILSSuite 3-05, 4805 CBD Perdana 2Jalan Perdana Cyber 1263000 Cyberjaya SelangorPhone: +60383186696Email: This email address is being protected from spambots. You need JavaScript enabled to view it.Website: https://sigmarectrix.comThe TOE is a firewall and routing platform which is a self-contained appliance consisting of hardware and firmware.The TOE is a product that manages the network from any congestion and harm. The TOE analyse the incoming and outgoing network traffic, loss and manipulation of data, business secrets and confidential of data leaks.Firewall are indeed important and everyone who is online must strive to have a firewall protection before it’s vulnerable to external and internal. The TOE core features include Traffic Shaper, Captive portal, Forward Caching Proxy, Virtual Private Network, High Availability & Hardware Failover, Intrusion Detection and Inline Prevention, Build-in reporting and monitoring tools, Support for plugins, DNS Server & DNS Forwarder, DHCP Server and Relay, Dynamic DNS, Backup & Restore, Stateful inspection firewall, Granular control over state table, 802.1Q VLAN support and many more.Garcinia Firewall Router v21.1.0', 'developer': 'Sigma Rectrix Systems (M) Sdn. Bhd.'}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ISCB-5-RPT-C122-CR-v1.pdf, code: nok'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ISCB-5-RPT-C122-CR-v1.pdf, code: 408'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/ISCB-5-CERT-C122-CERTIFICATE-v1.pdf.

    The manufacturer_web was updated.

    • The new value is https://sigmarectrix.com/.

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The report_pdf_hash property was set to 78035505e5f8130b5824e6653081158a8b93eed277f303e9c8875b29a07a4209.
    • The report_txt_hash property was set to 2d126b1ceee81fb85faeb10e4a2a4e796c579c6d40344f9c67bd90cfa7e36106.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 909626, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 33, '/Producer': 'macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20210629084536Z00'00'", '/ModDate': "D:20210629084536Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C122-CR-v1': 32}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 5}}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1}, 'FDP': {'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.2': 1, 'FIA_ATD.1': 1, 'FIA_AFL.1': 1}, 'FMT': {'FMT_SMF.1': 1, 'FMT_MTD.1': 1, 'FMT_MOF.1': 1}, 'FPT': {'FPT_STM.1': 1}, 'FTP': {'FTP_TRP.1': 1}}, 'cc_claims': {'A': {'A.NOEVIL': 1, 'A.PHYSEC': 1, 'A.SINGEN': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS v1.2': 2, 'TLS v1.3': 2, 'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ISCB-5-RPT-C122-CR-v1.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-5-RPT-C122-CR-v1.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ISCB-5-RPT-C122-CR-v1.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ISCB-5-RPT-C122-CR-v1.pdf, code: nok'].
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 1}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'ISCB-5-RPT-C122-CR-v1.pdf', 'st_filename': 'Garcinia Security Target v1.0.pdf'}.
    • The report_keywords property was updated, with the {'cc_sfr': {'__update__': {'FAU': {'__delete__': ['FAU_SAR.1']}, 'FDP': {'__delete__': ['FDP_ACF.1']}, 'FIA': {'__delete__': ['FIA_UID.2', 'FIA_SOS.1']}, 'FMT': {'__delete__': ['FMT_MSA.1', 'FMT_MSA.3', 'FMT_SMR.1']}}}, 'cc_claims': {'__delete__': ['OE']}, 'vendor': {}, 'tee_name': {}} data.
    • The st_keywords property was updated, with the {'cc_sfr': {'__update__': {'FDP': {'__insert__': {'FDP_IFF': 2}, '__update__': {'FDP_ACF.1': 7}}, 'FIA': {'__update__': {'FIA_UID.2': 6, 'FIA_UAU.1': 2}}, 'FMT': {'__update__': {'FMT_MSA.1': 10, 'FMT_MTD.1': 8, 'FMT_SMF.1': 10, 'FMT_SMR.1': 15}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AUDREC': 3, 'O.MEDIAT': 3, 'O.SECSTA': 3, 'O.DATA_FLOW': 3}}, 'T': {'__update__': {'T.AUDFUL': 2, 'T.NOAUTH': 2, 'T.TUSAGE': 3, 'T.MISUSE': 2}, '__delete__': ['T.PROCOM']}, 'A': {'__update__': {'A.PHYSEC': 2}}, 'OE': {'__update__': {'OE.PHYSEC': 2}}}}, 'vendor': {'__update__': {'STMicroelectronics': {'__update__': {'STM': 2}}}}, 'tee_name': {}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commonriteriaportal.org/']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C122-CR-v1': 32}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 5}}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_SAR.1': 1}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1}, 'FIA': {'FIA_UAU.2': 1, 'FIA_UID.2': 1, 'FIA_ATD.1': 1, 'FIA_AFL.1': 1, 'FIA_SOS.1': 1}, 'FMT': {'FMT_SMF.1': 1, 'FMT_MSA.1': 1, 'FMT_MTD.1': 1, 'FMT_MSA.3': 1, 'FMT_MOF.1': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_STM.1': 1}, 'FTP': {'FTP_TRP.1': 1}}, 'cc_claims': {'A': {'A.NOEVIL': 1, 'A.PHYSEC': 1, 'A.SINGEN': 1}, 'OE': {'OE': 1}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS v1.2': 2, 'TLS v1.3': 2, 'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 7}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMS.2': 1, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_FUN.1': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 4, 'ASE_SPD.1': 4, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_TSS.1': 4, 'ASE_ECD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 8, 'FAU_SAR.1': 6, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 9, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_ATD.1': 7, 'FIA_AFL.1': 6, 'FIA_UAU.2': 7, 'FIA_UID.2': 9, 'FIA_SOS.1': 5, 'FIA_ATD.1.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 3, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 5, 'FIA_UID.2.1': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 11, 'FMT_MSA.3': 11, 'FMT_MTD.1': 9, 'FMT_MOF.1': 7, 'FMT_SMF.1': 15, 'FMT_SMR.1': 18, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 7, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_TRP.1': 6, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ACCOUN': 4, 'O.AUDREC': 4, 'O.IDAUTH': 4, 'O.MEDIAT': 4, 'O.SECFUN': 4, 'O.SECSTA': 4, 'O.TOECOM': 4, 'O.DATA_FLOW': 4}, 'T': {'T.AUDACC': 4, 'T.AUDFUL': 3, 'T.MEDIAT': 3, 'T.NOAUTH': 3, 'T.OLDINF': 3, 'T.SELPRO': 3, 'T.TOECOM': 3, 'T.TUSAGE': 4, 'T.MISUSE': 3, 'T.PROCOM': 1}, 'A': {'A.NOEVIL': 3, 'A.PHYSEC': 3, 'A.SINGEN': 3}, 'OE': {'OE.ADMTRA': 3, 'OE.GUIDAN': 3, 'OE.PHYSEC': 3, 'OE.SINGEN': 3}}, 'vendor': {'STMicroelectronics': {'STM': 10}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS v1.2': 3, 'TLS v1.3': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_id property was set to ISCB-5-RPT-C122-CR-v1.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '78035505e5f8130b5824e6653081158a8b93eed277f303e9c8875b29a07a4209', 'st_pdf_hash': '4a6944a16081259d071280c6a612aadf274edb77e7e1756bf6ce375a30e5a4ed', 'report_txt_hash': '2d126b1ceee81fb85faeb10e4a2a4e796c579c6d40344f9c67bd90cfa7e36106', 'st_txt_hash': '5774a883851ddfc27594086a69c6e679f65b31ffa9911ead363b497b50af1094'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 5, 'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 6}, 'rules_randomness': {}, 'rules_tee': {'SE': 3}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_cert_id': {}} data.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
    • The cert_id property was set to None.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'ISCB-5-RPT-C122-CR-v1': 32}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['21.1.0']}.
    • The cert_id property was set to ISCB-5-RPT-C122-CR-v1.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Garcinia Firewall Router v21.1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/ISCB-5-CERT-C122-CERTIFICATE-v1.pdf",
  "dgst": "6840b6619ab4c5ce",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C122-CR-v1",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "21.1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2016-002-C068",
      "certification_date": "29-06-2021",
      "developer": "Sigma Rectrix Systems (M) Sdn. Bhd.",
      "enhanced": {
        "assurance_level": "EAL2",
        "category": "Network and Network-Related Devices and Systems",
        "cert_id": "C068",
        "certification_date": "29-06-2021",
        "developer": "Suite 3-05, 4805 CBD Perdana 2Jalan Perdana Cyber 1263000 Cyberjaya Selangor\nPhone: +60383186696Email: sales@sigmarectrix.comWebsite: https://sigmarectrix.com",
        "expiration_date": "29-06-2026",
        "mutual_recognition": "CCRA",
        "product": "Garcinia Firewall Router v21.1.0",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/ISCB-5-RPT-C122-CR-v1.pdf",
        "scope": "The TOE is a firewall and routing platform which is a self-contained appliance consisting of hardware and firmware.\nThe TOE is a product that manages the network from any congestion and harm. The TOE analyse the incoming and outgoing network traffic, loss and manipulation of data, business secrets and confidential of data leaks.\nFirewall are indeed important and everyone who is online must strive to have a firewall protection before it\u2019s vulnerable to external and internal. The TOE core features include Traffic Shaper, Captive portal, Forward Caching Proxy, Virtual Private Network, High Availability \u0026 Hardware Failover, Intrusion Detection and Inline Prevention, Build-in reporting and monitoring tools, Support for plugins, DNS Server \u0026 DNS Forwarder, DHCP Server and Relay, Dynamic DNS, Backup \u0026 Restore, Stateful inspection firewall, Granular control over state table, 802.1Q VLAN support and many more.",
        "status": "Valid",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/Garcinia_Security_Target_v10.pdf",
        "type": "Network and Network-Related Devices and Systems"
      },
      "expiration_date": "29-06-2026",
      "level": "EAL2",
      "product": "Garcinia Firewall Router v21.1.0",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/105"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sigma Rectrix Systems (M) Sdn Bhd",
  "manufacturer_web": "https://sigmarectrix.com/",
  "name": "Garcinia Firewall Router v21.1.0",
  "not_valid_after": "2026-06-29",
  "not_valid_before": "2021-06-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ISCB-5-CERT-C122-CERTIFICATE-v1.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20210702113323+08\u002700\u0027",
      "/Creator": "ISCB Printer",
      "/ModDate": "D:20210702114719+08\u002700\u0027",
      "/Producer": "KONICA MINOLTA bizhub C360i",
      "/Title": "SISCB Print21070211330",
      "pdf_file_size_bytes": 83646,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "ISCB-5-RPT-C122-CR-v1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C122-CR-v1": 32
        }
      },
      "cc_claims": {
        "A": {
          "A.NOEVIL": 1,
          "A.PHYSEC": 1,
          "A.SINGEN": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 2": 5,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 1,
          "FIA_ATD.1": 1,
          "FIA_UAU.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MTD.1": 1,
          "FMT_SMF.1": 1
        },
        "FPT": {
          "FPT_STM.1": 1
        },
        "FTP": {
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 1,
            "TLS v1.2": 2,
            "TLS v1.3": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20210629084536Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20210629084536Z00\u002700\u0027",
      "/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
      "pdf_file_size_bytes": 909626,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 33
    },
    "st_filename": "Garcinia Security Target v1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NOEVIL": 3,
          "A.PHYSEC": 2,
          "A.SINGEN": 3
        },
        "O": {
          "O.ACCOUN": 4,
          "O.AUDREC": 3,
          "O.DATA_FLOW": 3,
          "O.IDAUTH": 4,
          "O.MEDIAT": 3,
          "O.SECFUN": 4,
          "O.SECSTA": 3,
          "O.TOECOM": 4
        },
        "OE": {
          "OE.ADMTRA": 3,
          "OE.GUIDAN": 3,
          "OE.PHYSEC": 2,
          "OE.SINGEN": 3
        },
        "T": {
          "T.AUDACC": 4,
          "T.AUDFUL": 2,
          "T.MEDIAT": 3,
          "T.MISUSE": 2,
          "T.NOAUTH": 2,
          "T.OLDINF": 3,
          "T.SELPRO": 3,
          "T.TOECOM": 3,
          "T.TUSAGE": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 4,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 4,
          "ASE_OBJ.2": 4,
          "ASE_REQ.2": 4,
          "ASE_SPD.1": 4,
          "ASE_TSS.1": 4
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 7
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 8,
          "FAU_GEN.1.1": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 7,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 1,
          "FDP_IFF": 2
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 5,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 5,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 10,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 15,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1
        },
        "FTP": {
          "FTP_TRP.1": 6,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS v1.2": 3,
            "TLS v1.3": 3
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        },
        "STMicroelectronics": {
          "STM": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Securelytics",
      "/CreationDate": "D:20210620173631+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/ModDate": "D:20210620173631+00\u002700\u0027",
      "/Title": "Garcinia Security Target",
      "pdf_file_size_bytes": 971230,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commonriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 42
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/ISCB-5-RPT-C122-CR-v1.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/Garcinia%20Security%20Target%20v1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d25e4fbcd79ebddd0e58b7d7c330063739082765771db197237c3f751bdb4993",
      "txt_hash": "031e6f720822be0a49e86b536a07e443e1cb19be9e592ca90436b2525997d791"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "78035505e5f8130b5824e6653081158a8b93eed277f303e9c8875b29a07a4209",
      "txt_hash": "2d126b1ceee81fb85faeb10e4a2a4e796c579c6d40344f9c67bd90cfa7e36106"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4a6944a16081259d071280c6a612aadf274edb77e7e1756bf6ce375a30e5a4ed",
      "txt_hash": "5774a883851ddfc27594086a69c6e679f65b31ffa9911ead363b497b50af1094"
    }
  },
  "status": "active"
}