Tripwire Enterprise v8.8.2.2
CSV information ?
Status | active |
---|---|
Valid from | 03.09.2020 |
Valid until | 03.09.2025 |
Scheme | 🇨🇦 CA |
Manufacturer | Tripwire, Inc. |
Category | Detection Devices and Systems |
Security level | ALC_FLR.2, EAL2+ |
Maintenance updates | Tripwire Enterprise Version 8.9.1 (10.08.2022) Certification report Security target |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 2Security Assurance Requirements (SAR)
ALC_FLR.2Certificates
500 EWA 2019Evaluation facilities
EWA-Canada, EWAFile metadata
Title: | cyber-centre-product-evaluation-certificate-e-bg |
---|---|
Creation date: | D:20190122115136-04'00' |
Modification date: | D:20201023161231-05'00' |
Pages: | 1 |
Creator: | Adobe Illustrator CC 22.0 (Windows) |
Producer: | Adobe PDF library 15.00 |
Certification report ?
Extracted keywords
Libraries
OpenSSLTrusted Execution Environments
SEVendor
MicrosoftSecurity level
EAL 2Security Assurance Requirements (SAR)
ALC_FLR.2Certificates
500 EWA 2019Evaluation facilities
EWA, EWA-CanadaStandards
ISO/IEC 17025File metadata
Creation date: | D:20201005101229-04'00' |
---|---|
Modification date: | D:20201005101251-05'00' |
Pages: | 18 |
Producer: | Foxit PhantomPDF Printer Version 9.7.1.2227 |
References
No references.
Security target ?
Extracted keywords
Symmetric Algorithms
AES, 3DES, HMAC, HMAC-SHA-256Asymmetric Algorithms
ECDSA, ECCHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD5Protocols
SSH, SSL, TLS, TLS v1.1, TLS v1.2, VPNLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, GCMTrusted Execution Environments
SEVendor
Microsoft, CiscoSecurity level
EAL 2, EAL2Claims
O.PROTCT, O.IDSCAN, O.IDSENS, O.IDANLZ, O.RESPON, O.EADMIN, O.ACCESS, O.IDAUTH, O.OFLOWS, O.AUDITS, O.INTEGR, O.DAC, O.PROTECT, T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, A.ACCESS, A.ASCOPE, A.DYNMIC, A.PROTCT, A.LOCATE, A.MANAGE, A.NOEVIL, A.NOTRST, A.NOTRUST, OE.AUDIT_PROTECTION, OE.AUDIT_SORT, OE.TIME, OE.INSTAL, OE.PHYCAL, OE.CREDEN, OE.PERSON, OE.INTROPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.2, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_STG.1, FAU_GEN, FAU_SAR, FAU_SEL, FAU_STG, FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1, FCS_CKM, FDP_ACC.2, FDP_ACF.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_IFC.1, FDP_ACC, FDP_ACF, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FMT_MOF, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA, FMT_MOF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_SMR, FMT_SMF, FPT_STM, FPT_STM_EXT.1.1, FPT_ITT.1, FPT_STM_EXT.1, FPT_ITT.1.1, FPT_STM.1, FPT_ITT, FPT_STM_EXT, FTA_SSL.4, FTA_SSL.4.1, FTA_SSLSide-channel analysis
malfunctionStandards
FIPS PUB 186-4, FIPS 140-2, X.509File metadata
Title: | DS_RCT |
---|---|
Author: | Michelle Ruppel |
Creation date: | D:20200812121158-04'00' |
Modification date: | D:20200812121158-04'00' |
Pages: | 85 |
Creator: | Microsoft® Word 2016 |
Producer: | Microsoft® Word 2016 |
References
No references.
Heuristics ?
Extracted SARs
ASE_SPD.1, AGD_PRE.1, ASE_ECD.1, ASE_TSS.1, ADV_ARC.1, ASE_REQ.2, ALC_DEL.1, ADV_FSP.2, ASE_CCL.1, ASE_INT.1, AVA_VAN.2, ADV_TDS.1, AGD_OPE.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ASE_OBJ.2, ALC_FLR.2, ATE_COV.1, ALC_CMS.2Scheme data ?
Product | Tripwire Enterprise Version 8.8.2.2 Tripwire Enterprise Version 8.9.1 (August 2022) | |
---|---|---|
Vendor | Tripwire, Inc. | |
Level | EAL 2+ (ALC_FLR.2) | |
Certification Date | 2020-09-03 |
References ?
No references are available for this certificate.
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f217e25138dbc7404566c2bafb73e644091d51c3fd316a69ab10b6e889c60ef9', 'txt_hash': '2338c7be117762285a76c268e2c287ada9c6bc60ab8e053cc9853e2fb058e34d'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '44be7484a3eb09e51bc273e44b486831fc8f74ac65cb84632a8cfbeef7397904', 'txt_hash': '4dc334a465eb44bbecb2dda1c9b4028bc275064a30041d3aeb503346c00a9cc5'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '54a66fd3c132a43cf53400a6dbcd18a16297a747c16d2e9a4d9590c8213c7d2d', 'txt_hash': 'ce565bb873632c5d0ac441278f1252f6a84adbe1d28b7ec37328eca5b68d882c'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': {'pdf_file_size_bytes': 1640344, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20201023161231-05'00'", '/Producer': 'Adobe PDF library 15.00', '/Title': 'cyber-centre-product-evaluation-certificate-e-bg', '/Creator': 'Adobe Illustrator CC 22.0 (Windows)', '/CreationDate': "D:20190122115136-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'CA': {'500 EWA 2019': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'EWA': {'EWA-Canada': 1, 'EWA': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '500 EWA 2019 CT_no_sig_Eng v2.pdf'}
. - The report_frontpage property was set to
{'CA': {}}
. - The st_frontpage property was set to
None
.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'Tripwire Enterprise Version 8.8.2.2\n\t\t\tTripwire Enterprise Version 8.9.1 (August 2022)'}
data.
- The following values were inserted:
-
05.02.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'Tripwire Enterprise Version 8.8.2.2\n Tripwire Enterprise Version 8.9.1 (August 2022)'}
data.
- The scheme_data property was updated, with the
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
. - The scheme_data property was updated, with the
{'product': 'Tripwire Enterprise Version 8.8.2.2\n\t\t\tTripwire Enterprise Version 8.9.1 (August 2022)'}
data.
- The following values were inserted:
-
21.09.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'Tripwire Enterprise Version 8.8.2.2\n Tripwire Enterprise Version 8.9.1 (August 2022)'}
data.
- The scheme_data property was updated, with the
-
27.07.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'Tripwire Enterprise Version 8.8.2.2\n\t\t\tTripwire Enterprise Version 8.9.1 (August 2022)'}
data.
- The scheme_data property was updated, with the
-
18.05.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'Tripwire Enterprise Version 8.8.2.2\n Tripwire Enterprise Version 8.9.1 (August 2022)'}
data.
- The scheme_data property was updated, with the
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'product': 'Tripwire Enterprise Version 8.8.2.2\n\t\t\tTripwire Enterprise Version 8.9.1 (August 2022)', 'vendor': 'Tripwire, Inc.', 'level': 'EAL 2+ (ALC_FLR.2)', 'certification_date': '2020-09-03'}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2022-08-10', 'maintenance_title': 'Tripwire Enterprise Version 8.9.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20MR%20v1.0.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20ST%20v1.1.pdf'}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
44be7484a3eb09e51bc273e44b486831fc8f74ac65cb84632a8cfbeef7397904
. - The st_txt_hash property was set to
4dc334a465eb44bbecb2dda1c9b4028bc275064a30041d3aeb503346c00a9cc5
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1014975, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 85, '/Title': 'DS_RCT', '/Author': 'Michelle Ruppel', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200812121158-04'00'", '/ModDate': "D:20200812121158-04'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 5}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 12, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 6, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 10, 'FAU_SAR.1': 7, 'FAU_SAR.2': 8, 'FAU_SAR.3': 7, 'FAU_SEL.1': 8, 'FAU_STG.2': 12, 'FAU_STG.4': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 1, 'FAU_STG.1': 1, 'FAU_GEN': 1, 'FAU_SAR': 3, 'FAU_SEL': 1, 'FAU_STG': 2}, 'FCS': {'FCS_CKM.1': 8, 'FCS_CKM.4': 6, 'FCS_COP': 18, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 5, 'FCS_CKM': 2}, 'FDP': {'FDP_ACC.2': 8, 'FDP_ACF.1': 8, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 3, 'FDP_ITC.2': 1, 'FDP_ACC.1': 3, 'FDP_IFC.1': 1, 'FDP_ACC': 1, 'FDP_ACF': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_ATD.1': 7, 'FIA_SOS.1': 6, 'FIA_UAU.1': 9, 'FIA_UID.1': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL': 1, 'FIA_ATD': 1, 'FIA_SOS': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, 'FMT': {'FMT_MOF': 18, 'FMT_MSA.1': 9, 'FMT_MSA.3': 12, 'FMT_MTD.1': 11, 'FMT_SMF.1': 12, 'FMT_SMR.1': 10, 'FMT_MSA': 3, 'FMT_MOF.1': 3, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 1, 'FMT_SMR': 1, 'FMT_SMF': 1}, 'FPT': {'FPT_STM': 2, 'FPT_STM_EXT.1.1': 4, 'FPT_ITT.1': 7, 'FPT_STM_EXT.1': 10, 'FPT_ITT.1.1': 1, 'FPT_STM.1': 1, 'FPT_ITT': 1, 'FPT_STM_EXT': 1}, 'FTA': {'FTA_SSL.4': 7, 'FTA_SSL.4.1': 1, 'FTA_SSL': 1}}, 'cc_claims': {'O': {'O.PROTCT': 9, 'O.IDSCAN': 7, 'O.IDSENS': 9, 'O.IDANLZ': 5, 'O.RESPON': 5, 'O.EADMIN': 4, 'O.ACCESS': 12, 'O.IDAUTH': 19, 'O.OFLOWS': 6, 'O.AUDITS': 8, 'O.INTEGR': 7, 'O.DAC': 5, 'O.PROTECT': 1}, 'T': {'T.COMINT': 3, 'T.COMDIS': 3, 'T.LOSSOF': 3, 'T.NOHALT': 3, 'T.PRIVIL': 3, 'T.IMPCON': 4, 'T.INFLUX': 3, 'T.FACCNT': 3, 'T.SCNCFG': 3, 'T.SCNMLC': 3, 'T.SCNVUL': 3, 'T.FALACT': 3, 'T.FALREC': 3, 'T.FALASC': 3, 'T.MISUSE': 3, 'T.INADVE': 3, 'T.MISACT': 3}, 'A': {'A.ACCESS': 3, 'A.ASCOPE': 3, 'A.DYNMIC': 3, 'A.PROTCT': 3, 'A.LOCATE': 3, 'A.MANAGE': 3, 'A.NOEVIL': 3, 'A.NOTRST': 2, 'A.NOTRUST': 1}, 'OE': {'OE.AUDIT_PROTECTION': 4, 'OE.AUDIT_SORT': 4, 'OE.TIME': 6, 'OE.INSTAL': 5, 'OE.PHYCAL': 6, 'OE.CREDEN': 5, 'OE.PERSON': 5, 'OE.INTROP': 5}}, 'vendor': {'Microsoft': {'Microsoft': 10}, 'Cisco': {'Cisco': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'3DES': {'3DES': 1}}, 'constructions': {'MAC': {'HMAC': 1, 'HMAC-SHA-256': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 10}, 'SHA2': {'SHA-224': 2, 'SHA-256': 8, 'SHA-384': 3, 'SHA-512': 4}}, 'MD': {'MD5': {'MD5': 5}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 45, 'TLS v1.1': 3, 'TLS v1.2': 1}}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}, 'GCM': {'GCM': 3}}, 'ecc_curve': {'NIST': {'P-256': 4, 'P-384': 4, 'P-521': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 16}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 3, 'FIPS 140-2': 2}, 'X509': {'X.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
Tripwire Enterprise 8.8.2.2 ST v1.0.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Tripwire%20Enterprise%208.8.2.2%20ST%20v1.0.pdf, code: nok']
.
- The errors property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Tripwire%20Enterprise%208.8.2.2%20ST%20v1.0.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}]}
values discarded.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/500%20EWA%202019%20CR%20v.1.0.pdf, code: nok']
.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/500%20EWA%202019%20CT_no_sig_Eng%20v2.pdf
.
The manufacturer_web was updated.
- The new value is
https://www.tripwire.com
.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
None
.
The manufacturer_web was updated.
- The new value is
None
.
- The new value is
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
26.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The st_keywords property was updated, with the
{'vendor': {'__insert__': {'Cisco': {'Cisco': 3}}}, 'crypto_protocol': {'__insert__': {'VPN': {'VPN': 1}}}}
data.
- The st_keywords property was updated, with the
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '500 EWA 2019 CR v.1.0.pdf', 'st_filename': 'Tripwire Enterprise 8.8.2.2 ST v1.0.pdf'}
. - The report_keywords property was updated, with the
{'crypto_scheme': {}, 'crypto_protocol': {}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SE': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 6}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_GEN': 1, 'FAU_SAR': 3, 'FAU_SEL': 1, 'FAU_STG': 2}, '__update__': {'FAU_GEN.1': 10, 'FAU_SAR.1': 7, 'FAU_STG.1': 1}}, 'FCS': {'__insert__': {'FCS_COP': 18, 'FCS_CKM': 2}, '__update__': {'FCS_CKM.4': 6, 'FCS_COP.1': 5}, '__delete__': ['FCS_CKM.2']}, 'FDP': {'__insert__': {'FDP_ACC': 1, 'FDP_ACF': 1}, '__update__': {'FDP_ACF.1': 8, 'FDP_ACF.1.3': 2, 'FDP_ACC.1': 3}}, 'FIA': {'__insert__': {'FIA_AFL': 1, 'FIA_ATD': 1, 'FIA_SOS': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, '__update__': {'FIA_UAU.1': 9, 'FIA_UID.1': 10}}, 'FMT': {'__insert__': {'FMT_MOF': 18, 'FMT_MSA': 3, 'FMT_MOF.1': 3, 'FMT_MTD': 1, 'FMT_SMR': 1, 'FMT_SMF': 1}, '__update__': {'FMT_MSA.1': 9, 'FMT_SMF.1': 12, 'FMT_SMR.1': 10}}, 'FPT': {'__insert__': {'FPT_ITT': 1, 'FPT_STM_EXT': 1}}, 'FTA': {'__insert__': {'FTA_SSL': 1}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.IDSCAN': 7, 'O.IDANLZ': 5, 'O.EADMIN': 4, 'O.IDAUTH': 19, 'O.AUDITS': 8, 'O.DAC': 5}}, 'OE': {'__update__': {'OE.AUDIT_PROTECTION': 4, 'OE.AUDIT_SORT': 4, 'OE.TIME': 6, 'OE.PHYCAL': 6, 'OE.PERSON': 5}}}, '__delete__': ['R']}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 10}}, 'SHA2': {'__update__': {'SHA-256': 8}}}}}}, 'crypto_scheme': {}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 1}}, 'TLS': {'__update__': {'TLS': 45}}}}}}, 'cipher_mode': {'__delete__': ['CCM']}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 16}}}}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SE': 3}}}}, 'standard_id': {'__update__': {'FIPS': {'__insert__': {'FIPS 140-2': 2}}}}}
data.
The computed heuristics were updated.
- The cert_id property was set to
500-EWA-2019
.
- The following values were inserted:
-
27.08.2022 The certificate data changed.
Certificate changed
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2022-08-10', 'maintenance_title': 'Tripwire Enterprise Version 8.9.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20MR%20v1.0.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20ST%20v1.1.pdf'}]}
.
- The new value is
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:contact@cyber.gc.ca', 'https://www.tripwire.com/support/', 'https://cve.mitre.org/cve/']}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'CA': {'500 EWA 2019': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 3}}, 'eval_facility': {'EWA': {'EWA': 1, 'EWA-Canada': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'KA': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 5}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 12, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 13, 'FAU_SAR.1': 9, 'FAU_SAR.2': 8, 'FAU_SAR.3': 7, 'FAU_SEL.1': 8, 'FAU_STG.2': 12, 'FAU_STG.4': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 1, 'FAU_STG.1': 2}, 'FCS': {'FCS_CKM.1': 8, 'FCS_CKM.4': 8, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_ACC.2': 8, 'FDP_ACF.1': 9, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 3, 'FDP_ITC.2': 1, 'FDP_ACC.1': 4, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_ATD.1': 7, 'FIA_SOS.1': 6, 'FIA_UAU.1': 10, 'FIA_UID.1': 11, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA.1': 10, 'FMT_MSA.3': 12, 'FMT_MTD.1': 11, 'FMT_SMF.1': 14, 'FMT_SMR.1': 11, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM': 2, 'FPT_STM_EXT.1.1': 4, 'FPT_ITT.1': 7, 'FPT_STM_EXT.1': 10, 'FPT_ITT.1.1': 1, 'FPT_STM.1': 1}, 'FTA': {'FTA_SSL.4': 7, 'FTA_SSL.4.1': 1}}, 'cc_claims': {'O': {'O.PROTCT': 9, 'O.IDSCAN': 9, 'O.IDSENS': 9, 'O.IDANLZ': 7, 'O.RESPON': 5, 'O.EADMIN': 6, 'O.ACCESS': 12, 'O.IDAUTH': 21, 'O.OFLOWS': 6, 'O.AUDITS': 10, 'O.INTEGR': 7, 'O.DAC': 7, 'O.PROTECT': 1}, 'T': {'T.COMINT': 3, 'T.COMDIS': 3, 'T.LOSSOF': 3, 'T.NOHALT': 3, 'T.PRIVIL': 3, 'T.IMPCON': 4, 'T.INFLUX': 3, 'T.FACCNT': 3, 'T.SCNCFG': 3, 'T.SCNMLC': 3, 'T.SCNVUL': 3, 'T.FALACT': 3, 'T.FALREC': 3, 'T.FALASC': 3, 'T.MISUSE': 3, 'T.INADVE': 3, 'T.MISACT': 3}, 'A': {'A.ACCESS': 3, 'A.ASCOPE': 3, 'A.DYNMIC': 3, 'A.PROTCT': 3, 'A.LOCATE': 3, 'A.MANAGE': 3, 'A.NOEVIL': 3, 'A.NOTRST': 2, 'A.NOTRUST': 1}, 'R': {'R.GZ': 1}, 'OE': {'OE.AUDIT_PROTECTION': 5, 'OE.AUDIT_SORT': 5, 'OE.TIME': 7, 'OE.INSTAL': 5, 'OE.PHYCAL': 7, 'OE.CREDEN': 5, 'OE.PERSON': 6, 'OE.INTROP': 5}}, 'vendor': {'STMicroelectronics': {'STM': 18}, 'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 1}}, 'constructions': {'MAC': {'HMAC': 1, 'HMAC-SHA-256': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 11}, 'SHA2': {'SHA-224': 2, 'SHA-256': 9, 'SHA-384': 3, 'SHA-512': 4}}, 'MD': {'MD5': {'MD5': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KA': {'KA': 2}}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'TLS': {'SSL': {'SSL': 16}, 'TLS': {'TLS': 34, 'TLS v1.1': 3, 'TLS v1.2': 1}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}, 'GCM': {'GCM': 3}, 'CCM': {'CCM': 10}}, 'ecc_curve': {'NIST': {'P-256': 4, 'P-384': 4, 'P-521': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 15}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 6}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 3}, 'X509': {'X.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': 'f217e25138dbc7404566c2bafb73e644091d51c3fd316a69ab10b6e889c60ef9', 'st_pdf_hash': '44be7484a3eb09e51bc273e44b486831fc8f74ac65cb84632a8cfbeef7397904', 'report_txt_hash': '2338c7be117762285a76c268e2c287ada9c6bc60ab8e053cc9853e2fb058e34d', 'st_txt_hash': '4dc334a465eb44bbecb2dda1c9b4028bc275064a30041d3aeb503346c00a9cc5'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 3}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_block_cipher_modes': {'__insert__': {'CCM': 10}}}
data.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_cert_id': {'500 EWA 2019': 1}}
data.
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
. - The cert_id property was set to
500 EWA 2019
.
- The report_keywords property was updated, with the
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['8.8.2.2']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Tripwire Enterprise v8.8.2.2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Detection Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/500%20EWA%202019%20CT_no_sig_Eng%20v2.pdf",
"dgst": "77ef42af7556edf5",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "500-EWA-2019",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"8.8.2.2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"certification_date": "2020-09-03",
"level": "EAL 2+ (ALC_FLR.2)",
"product": "Tripwire Enterprise Version 8.8.2.2\n\t\t\tTripwire Enterprise Version 8.9.1 (August 2022)",
"vendor": "Tripwire, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-08-10",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20MR%20v1.0.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20ST%20v1.1.pdf",
"maintenance_title": "Tripwire Enterprise Version 8.9.1"
}
]
},
"manufacturer": "Tripwire, Inc.",
"manufacturer_web": "https://www.tripwire.com",
"name": "Tripwire Enterprise v8.8.2.2",
"not_valid_after": "2025-09-03",
"not_valid_before": "2020-09-03",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "500 EWA 2019 CT_no_sig_Eng v2.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"500 EWA 2019": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA": 1,
"EWA-Canada": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20190122115136-04\u002700\u0027",
"/Creator": "Adobe Illustrator CC 22.0 (Windows)",
"/ModDate": "D:20201023161231-05\u002700\u0027",
"/Producer": "Adobe PDF library 15.00",
"/Title": "cyber-centre-product-evaluation-certificate-e-bg",
"pdf_file_size_bytes": 1640344,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "500 EWA 2019 CR v.1.0.pdf",
"report_frontpage": {
"CA": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"500 EWA 2019": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA": 1,
"EWA-Canada": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "D:20201005101229-04\u002700\u0027",
"/Creator": "",
"/Keywords": "",
"/ModDate": "D:20201005101251-05\u002700\u0027",
"/Producer": "Foxit PhantomPDF Printer Version 9.7.1.2227",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 604236,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://cve.mitre.org/cve/",
"https://www.tripwire.com/support/",
"mailto:contact@cyber.gc.ca"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "Tripwire Enterprise 8.8.2.2 ST v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDSA": {
"ECDSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.ASCOPE": 3,
"A.DYNMIC": 3,
"A.LOCATE": 3,
"A.MANAGE": 3,
"A.NOEVIL": 3,
"A.NOTRST": 2,
"A.NOTRUST": 1,
"A.PROTCT": 3
},
"O": {
"O.ACCESS": 12,
"O.AUDITS": 8,
"O.DAC": 5,
"O.EADMIN": 4,
"O.IDANLZ": 5,
"O.IDAUTH": 19,
"O.IDSCAN": 7,
"O.IDSENS": 9,
"O.INTEGR": 7,
"O.OFLOWS": 6,
"O.PROTCT": 9,
"O.PROTECT": 1,
"O.RESPON": 5
},
"OE": {
"OE.AUDIT_PROTECTION": 4,
"OE.AUDIT_SORT": 4,
"OE.CREDEN": 5,
"OE.INSTAL": 5,
"OE.INTROP": 5,
"OE.PERSON": 5,
"OE.PHYCAL": 6,
"OE.TIME": 6
},
"T": {
"T.COMDIS": 3,
"T.COMINT": 3,
"T.FACCNT": 3,
"T.FALACT": 3,
"T.FALASC": 3,
"T.FALREC": 3,
"T.IMPCON": 4,
"T.INADVE": 3,
"T.INFLUX": 3,
"T.LOSSOF": 3,
"T.MISACT": 3,
"T.MISUSE": 3,
"T.NOHALT": 3,
"T.PRIVIL": 3,
"T.SCNCFG": 3,
"T.SCNMLC": 3,
"T.SCNVUL": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 12,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 6
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 3,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 8,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 7,
"FAU_SAR.3.1": 1,
"FAU_SEL": 1,
"FAU_SEL.1": 8,
"FAU_STG": 2,
"FAU_STG.1": 1,
"FAU_STG.2": 12,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4": 7,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 8,
"FCS_CKM.1.1": 1,
"FCS_CKM.4": 6,
"FCS_CKM.4.1": 1,
"FCS_COP": 18,
"FCS_COP.1": 5
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 3,
"FDP_ACC.2": 8,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1,
"FDP_ITC.1": 3,
"FDP_ITC.2": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID": 1,
"FIA_UID.1": 10,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF": 18,
"FMT_MOF.1": 3,
"FMT_MSA": 3,
"FMT_MSA.1": 9,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 12,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 11,
"FMT_MTD.1.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT": 1,
"FPT_ITT.1": 7,
"FPT_ITT.1.1": 1,
"FPT_STM": 2,
"FPT_STM.1": 1,
"FPT_STM_EXT": 1,
"FPT_STM_EXT.1": 10,
"FPT_STM_EXT.1.1": 4
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL.4": 7,
"FTA_SSL.4.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 16
}
},
"crypto_protocol": {
"SSH": {
"SSH": 5
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 45,
"TLS v1.1": 3,
"TLS v1.2": 1
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 4,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 5
}
},
"SHA": {
"SHA1": {
"SHA-1": 10
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 8,
"SHA-384": 3,
"SHA-512": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2,
"FIPS PUB 186-4": 3
},
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"3DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 1,
"HMAC-SHA-256": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 3
}
},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 3
},
"Microsoft": {
"Microsoft": 10
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Michelle Ruppel",
"/CreationDate": "D:20200812121158-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20200812121158-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "DS_RCT",
"pdf_file_size_bytes": 1014975,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 85
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/500%20EWA%202019%20CR%20v.1.0.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/Tripwire%20Enterprise%208.8.2.2%20ST%20v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "54a66fd3c132a43cf53400a6dbcd18a16297a747c16d2e9a4d9590c8213c7d2d",
"txt_hash": "ce565bb873632c5d0ac441278f1252f6a84adbe1d28b7ec37328eca5b68d882c"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f217e25138dbc7404566c2bafb73e644091d51c3fd316a69ab10b6e889c60ef9",
"txt_hash": "2338c7be117762285a76c268e2c287ada9c6bc60ab8e053cc9853e2fb058e34d"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "44be7484a3eb09e51bc273e44b486831fc8f74ac65cb84632a8cfbeef7397904",
"txt_hash": "4dc334a465eb44bbecb2dda1c9b4028bc275064a30041d3aeb503346c00a9cc5"
}
},
"status": "active"
}