Tripwire Enterprise v8.8.2.2

CSV information ?

Status active
Valid from 03.09.2020
Valid until 03.09.2025
Scheme 🇨🇦 CA
Manufacturer Tripwire, Inc.
Category Detection Devices and Systems
Security level ALC_FLR.2, EAL2+
Maintenance updates Tripwire Enterprise Version 8.9.1 (10.08.2022) Certification report Security target

Heuristics summary ?

Certificate ID: 500-EWA-2019

Certificate ?

Extracted keywords

Security level
EAL 2
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
500 EWA 2019
Evaluation facilities
EWA-Canada, EWA

File metadata

Title: cyber-centre-product-evaluation-certificate-e-bg
Creation date: D:20190122115136-04'00'
Modification date: D:20201023161231-05'00'
Pages: 1
Creator: Adobe Illustrator CC 22.0 (Windows)
Producer: Adobe PDF library 15.00

Certification report ?

Extracted keywords

Libraries
OpenSSL

Trusted Execution Environments
SE
Vendor
Microsoft

Security level
EAL 2
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
500 EWA 2019
Evaluation facilities
EWA, EWA-Canada

Standards
ISO/IEC 17025

File metadata

Creation date: D:20201005101229-04'00'
Modification date: D:20201005101251-05'00'
Pages: 18
Producer: Foxit PhantomPDF Printer Version 9.7.1.2227

References

No references.

Security target ?

Extracted keywords

Symmetric Algorithms
AES, 3DES, HMAC, HMAC-SHA-256
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD5
Protocols
SSH, SSL, TLS, TLS v1.1, TLS v1.2, VPN
Libraries
OpenSSL
Elliptic Curves
P-256, P-384, P-521
Block cipher modes
CBC, GCM

Trusted Execution Environments
SE
Vendor
Microsoft, Cisco

Security level
EAL 2, EAL2
Claims
O.PROTCT, O.IDSCAN, O.IDSENS, O.IDANLZ, O.RESPON, O.EADMIN, O.ACCESS, O.IDAUTH, O.OFLOWS, O.AUDITS, O.INTEGR, O.DAC, O.PROTECT, T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, A.ACCESS, A.ASCOPE, A.DYNMIC, A.PROTCT, A.LOCATE, A.MANAGE, A.NOEVIL, A.NOTRST, A.NOTRUST, OE.AUDIT_PROTECTION, OE.AUDIT_SORT, OE.TIME, OE.INSTAL, OE.PHYCAL, OE.CREDEN, OE.PERSON, OE.INTROP
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.2, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_STG.1, FAU_GEN, FAU_SAR, FAU_SEL, FAU_STG, FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1, FCS_CKM, FDP_ACC.2, FDP_ACF.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_IFC.1, FDP_ACC, FDP_ACF, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FMT_MOF, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA, FMT_MOF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_SMR, FMT_SMF, FPT_STM, FPT_STM_EXT.1.1, FPT_ITT.1, FPT_STM_EXT.1, FPT_ITT.1.1, FPT_STM.1, FPT_ITT, FPT_STM_EXT, FTA_SSL.4, FTA_SSL.4.1, FTA_SSL

Side-channel analysis
malfunction

Standards
FIPS PUB 186-4, FIPS 140-2, X.509

File metadata

Title: DS_RCT
Author: Michelle Ruppel
Creation date: D:20200812121158-04'00'
Modification date: D:20200812121158-04'00'
Pages: 85
Creator: Microsoft® Word 2016
Producer: Microsoft® Word 2016

References

No references.

Heuristics ?

Certificate ID: 500-EWA-2019

Extracted SARs

ASE_SPD.1, AGD_PRE.1, ASE_ECD.1, ASE_TSS.1, ADV_ARC.1, ASE_REQ.2, ALC_DEL.1, ADV_FSP.2, ASE_CCL.1, ASE_INT.1, AVA_VAN.2, ADV_TDS.1, AGD_OPE.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ASE_OBJ.2, ALC_FLR.2, ATE_COV.1, ALC_CMS.2

Scheme data ?

Product Tripwire Enterprise Version 8.8.2.2 Tripwire Enterprise Version 8.9.1 (August 2022)
Vendor Tripwire, Inc.
Level EAL 2+ (ALC_FLR.2)
Certification Date 2020-09-03

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f217e25138dbc7404566c2bafb73e644091d51c3fd316a69ab10b6e889c60ef9', 'txt_hash': '2338c7be117762285a76c268e2c287ada9c6bc60ab8e053cc9853e2fb058e34d'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '44be7484a3eb09e51bc273e44b486831fc8f74ac65cb84632a8cfbeef7397904', 'txt_hash': '4dc334a465eb44bbecb2dda1c9b4028bc275064a30041d3aeb503346c00a9cc5'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '54a66fd3c132a43cf53400a6dbcd18a16297a747c16d2e9a4d9590c8213c7d2d', 'txt_hash': 'ce565bb873632c5d0ac441278f1252f6a84adbe1d28b7ec37328eca5b68d882c'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 1640344, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20201023161231-05'00'", '/Producer': 'Adobe PDF library 15.00', '/Title': 'cyber-centre-product-evaluation-certificate-e-bg', '/Creator': 'Adobe Illustrator CC 22.0 (Windows)', '/CreationDate': "D:20190122115136-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'CA': {'500 EWA 2019': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'EWA': {'EWA-Canada': 1, 'EWA': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '500 EWA 2019 CT_no_sig_Eng v2.pdf'}.
    • The report_frontpage property was set to {'CA': {}}.
    • The st_frontpage property was set to None.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'Tripwire Enterprise Version 8.8.2.2\n\t\t\tTripwire Enterprise Version 8.9.1 (August 2022)'} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'Tripwire Enterprise Version 8.8.2.2\n Tripwire Enterprise Version 8.9.1 (August 2022)'} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'product': 'Tripwire Enterprise Version 8.8.2.2\n\t\t\tTripwire Enterprise Version 8.9.1 (August 2022)'} data.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'Tripwire Enterprise Version 8.8.2.2\n Tripwire Enterprise Version 8.9.1 (August 2022)'} data.
  • 27.07.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'Tripwire Enterprise Version 8.8.2.2\n\t\t\tTripwire Enterprise Version 8.9.1 (August 2022)'} data.
  • 18.05.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'Tripwire Enterprise Version 8.8.2.2\n Tripwire Enterprise Version 8.9.1 (August 2022)'} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'Tripwire Enterprise Version 8.8.2.2\n\t\t\tTripwire Enterprise Version 8.9.1 (August 2022)', 'vendor': 'Tripwire, Inc.', 'level': 'EAL 2+ (ALC_FLR.2)', 'certification_date': '2020-09-03'}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2022-08-10', 'maintenance_title': 'Tripwire Enterprise Version 8.9.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20MR%20v1.0.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20ST%20v1.1.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 44be7484a3eb09e51bc273e44b486831fc8f74ac65cb84632a8cfbeef7397904.
    • The st_txt_hash property was set to 4dc334a465eb44bbecb2dda1c9b4028bc275064a30041d3aeb503346c00a9cc5.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1014975, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 85, '/Title': 'DS_RCT', '/Author': 'Michelle Ruppel', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200812121158-04'00'", '/ModDate': "D:20200812121158-04'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 5}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 12, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 6, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 10, 'FAU_SAR.1': 7, 'FAU_SAR.2': 8, 'FAU_SAR.3': 7, 'FAU_SEL.1': 8, 'FAU_STG.2': 12, 'FAU_STG.4': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 1, 'FAU_STG.1': 1, 'FAU_GEN': 1, 'FAU_SAR': 3, 'FAU_SEL': 1, 'FAU_STG': 2}, 'FCS': {'FCS_CKM.1': 8, 'FCS_CKM.4': 6, 'FCS_COP': 18, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 5, 'FCS_CKM': 2}, 'FDP': {'FDP_ACC.2': 8, 'FDP_ACF.1': 8, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 3, 'FDP_ITC.2': 1, 'FDP_ACC.1': 3, 'FDP_IFC.1': 1, 'FDP_ACC': 1, 'FDP_ACF': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_ATD.1': 7, 'FIA_SOS.1': 6, 'FIA_UAU.1': 9, 'FIA_UID.1': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL': 1, 'FIA_ATD': 1, 'FIA_SOS': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, 'FMT': {'FMT_MOF': 18, 'FMT_MSA.1': 9, 'FMT_MSA.3': 12, 'FMT_MTD.1': 11, 'FMT_SMF.1': 12, 'FMT_SMR.1': 10, 'FMT_MSA': 3, 'FMT_MOF.1': 3, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 1, 'FMT_SMR': 1, 'FMT_SMF': 1}, 'FPT': {'FPT_STM': 2, 'FPT_STM_EXT.1.1': 4, 'FPT_ITT.1': 7, 'FPT_STM_EXT.1': 10, 'FPT_ITT.1.1': 1, 'FPT_STM.1': 1, 'FPT_ITT': 1, 'FPT_STM_EXT': 1}, 'FTA': {'FTA_SSL.4': 7, 'FTA_SSL.4.1': 1, 'FTA_SSL': 1}}, 'cc_claims': {'O': {'O.PROTCT': 9, 'O.IDSCAN': 7, 'O.IDSENS': 9, 'O.IDANLZ': 5, 'O.RESPON': 5, 'O.EADMIN': 4, 'O.ACCESS': 12, 'O.IDAUTH': 19, 'O.OFLOWS': 6, 'O.AUDITS': 8, 'O.INTEGR': 7, 'O.DAC': 5, 'O.PROTECT': 1}, 'T': {'T.COMINT': 3, 'T.COMDIS': 3, 'T.LOSSOF': 3, 'T.NOHALT': 3, 'T.PRIVIL': 3, 'T.IMPCON': 4, 'T.INFLUX': 3, 'T.FACCNT': 3, 'T.SCNCFG': 3, 'T.SCNMLC': 3, 'T.SCNVUL': 3, 'T.FALACT': 3, 'T.FALREC': 3, 'T.FALASC': 3, 'T.MISUSE': 3, 'T.INADVE': 3, 'T.MISACT': 3}, 'A': {'A.ACCESS': 3, 'A.ASCOPE': 3, 'A.DYNMIC': 3, 'A.PROTCT': 3, 'A.LOCATE': 3, 'A.MANAGE': 3, 'A.NOEVIL': 3, 'A.NOTRST': 2, 'A.NOTRUST': 1}, 'OE': {'OE.AUDIT_PROTECTION': 4, 'OE.AUDIT_SORT': 4, 'OE.TIME': 6, 'OE.INSTAL': 5, 'OE.PHYCAL': 6, 'OE.CREDEN': 5, 'OE.PERSON': 5, 'OE.INTROP': 5}}, 'vendor': {'Microsoft': {'Microsoft': 10}, 'Cisco': {'Cisco': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'3DES': {'3DES': 1}}, 'constructions': {'MAC': {'HMAC': 1, 'HMAC-SHA-256': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 10}, 'SHA2': {'SHA-224': 2, 'SHA-256': 8, 'SHA-384': 3, 'SHA-512': 4}}, 'MD': {'MD5': {'MD5': 5}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 45, 'TLS v1.1': 3, 'TLS v1.2': 1}}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}, 'GCM': {'GCM': 3}}, 'ecc_curve': {'NIST': {'P-256': 4, 'P-384': 4, 'P-521': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 16}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 3, 'FIPS 140-2': 2}, 'X509': {'X.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to Tripwire Enterprise 8.8.2.2 ST v1.0.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}]} values added.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Tripwire%20Enterprise%208.8.2.2%20ST%20v1.0.pdf, code: nok'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Tripwire%20Enterprise%208.8.2.2%20ST%20v1.0.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/500%20EWA%202019%20CR%20v.1.0.pdf, code: nok'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/500%20EWA%202019%20CT_no_sig_Eng%20v2.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.tripwire.com.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'vendor': {'__insert__': {'Cisco': {'Cisco': 3}}}, 'crypto_protocol': {'__insert__': {'VPN': {'VPN': 1}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '500 EWA 2019 CR v.1.0.pdf', 'st_filename': 'Tripwire Enterprise 8.8.2.2 ST v1.0.pdf'}.
    • The report_keywords property was updated, with the {'crypto_scheme': {}, 'crypto_protocol': {}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SE': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 6}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_GEN': 1, 'FAU_SAR': 3, 'FAU_SEL': 1, 'FAU_STG': 2}, '__update__': {'FAU_GEN.1': 10, 'FAU_SAR.1': 7, 'FAU_STG.1': 1}}, 'FCS': {'__insert__': {'FCS_COP': 18, 'FCS_CKM': 2}, '__update__': {'FCS_CKM.4': 6, 'FCS_COP.1': 5}, '__delete__': ['FCS_CKM.2']}, 'FDP': {'__insert__': {'FDP_ACC': 1, 'FDP_ACF': 1}, '__update__': {'FDP_ACF.1': 8, 'FDP_ACF.1.3': 2, 'FDP_ACC.1': 3}}, 'FIA': {'__insert__': {'FIA_AFL': 1, 'FIA_ATD': 1, 'FIA_SOS': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, '__update__': {'FIA_UAU.1': 9, 'FIA_UID.1': 10}}, 'FMT': {'__insert__': {'FMT_MOF': 18, 'FMT_MSA': 3, 'FMT_MOF.1': 3, 'FMT_MTD': 1, 'FMT_SMR': 1, 'FMT_SMF': 1}, '__update__': {'FMT_MSA.1': 9, 'FMT_SMF.1': 12, 'FMT_SMR.1': 10}}, 'FPT': {'__insert__': {'FPT_ITT': 1, 'FPT_STM_EXT': 1}}, 'FTA': {'__insert__': {'FTA_SSL': 1}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.IDSCAN': 7, 'O.IDANLZ': 5, 'O.EADMIN': 4, 'O.IDAUTH': 19, 'O.AUDITS': 8, 'O.DAC': 5}}, 'OE': {'__update__': {'OE.AUDIT_PROTECTION': 4, 'OE.AUDIT_SORT': 4, 'OE.TIME': 6, 'OE.PHYCAL': 6, 'OE.PERSON': 5}}}, '__delete__': ['R']}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 10}}, 'SHA2': {'__update__': {'SHA-256': 8}}}}}}, 'crypto_scheme': {}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 1}}, 'TLS': {'__update__': {'TLS': 45}}}}}}, 'cipher_mode': {'__delete__': ['CCM']}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 16}}}}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SE': 3}}}}, 'standard_id': {'__update__': {'FIPS': {'__insert__': {'FIPS 140-2': 2}}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to 500-EWA-2019.
  • 27.08.2022 The certificate data changed.
    Certificate changed

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2022-08-10', 'maintenance_title': 'Tripwire Enterprise Version 8.9.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20MR%20v1.0.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20ST%20v1.1.pdf'}]}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:contact@cyber.gc.ca', 'https://www.tripwire.com/support/', 'https://cve.mitre.org/cve/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'CA': {'500 EWA 2019': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 3}}, 'eval_facility': {'EWA': {'EWA': 1, 'EWA-Canada': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'KA': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 5}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 12, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 13, 'FAU_SAR.1': 9, 'FAU_SAR.2': 8, 'FAU_SAR.3': 7, 'FAU_SEL.1': 8, 'FAU_STG.2': 12, 'FAU_STG.4': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 1, 'FAU_STG.1': 2}, 'FCS': {'FCS_CKM.1': 8, 'FCS_CKM.4': 8, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_ACC.2': 8, 'FDP_ACF.1': 9, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 3, 'FDP_ITC.2': 1, 'FDP_ACC.1': 4, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_ATD.1': 7, 'FIA_SOS.1': 6, 'FIA_UAU.1': 10, 'FIA_UID.1': 11, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA.1': 10, 'FMT_MSA.3': 12, 'FMT_MTD.1': 11, 'FMT_SMF.1': 14, 'FMT_SMR.1': 11, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM': 2, 'FPT_STM_EXT.1.1': 4, 'FPT_ITT.1': 7, 'FPT_STM_EXT.1': 10, 'FPT_ITT.1.1': 1, 'FPT_STM.1': 1}, 'FTA': {'FTA_SSL.4': 7, 'FTA_SSL.4.1': 1}}, 'cc_claims': {'O': {'O.PROTCT': 9, 'O.IDSCAN': 9, 'O.IDSENS': 9, 'O.IDANLZ': 7, 'O.RESPON': 5, 'O.EADMIN': 6, 'O.ACCESS': 12, 'O.IDAUTH': 21, 'O.OFLOWS': 6, 'O.AUDITS': 10, 'O.INTEGR': 7, 'O.DAC': 7, 'O.PROTECT': 1}, 'T': {'T.COMINT': 3, 'T.COMDIS': 3, 'T.LOSSOF': 3, 'T.NOHALT': 3, 'T.PRIVIL': 3, 'T.IMPCON': 4, 'T.INFLUX': 3, 'T.FACCNT': 3, 'T.SCNCFG': 3, 'T.SCNMLC': 3, 'T.SCNVUL': 3, 'T.FALACT': 3, 'T.FALREC': 3, 'T.FALASC': 3, 'T.MISUSE': 3, 'T.INADVE': 3, 'T.MISACT': 3}, 'A': {'A.ACCESS': 3, 'A.ASCOPE': 3, 'A.DYNMIC': 3, 'A.PROTCT': 3, 'A.LOCATE': 3, 'A.MANAGE': 3, 'A.NOEVIL': 3, 'A.NOTRST': 2, 'A.NOTRUST': 1}, 'R': {'R.GZ': 1}, 'OE': {'OE.AUDIT_PROTECTION': 5, 'OE.AUDIT_SORT': 5, 'OE.TIME': 7, 'OE.INSTAL': 5, 'OE.PHYCAL': 7, 'OE.CREDEN': 5, 'OE.PERSON': 6, 'OE.INTROP': 5}}, 'vendor': {'STMicroelectronics': {'STM': 18}, 'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 1}}, 'constructions': {'MAC': {'HMAC': 1, 'HMAC-SHA-256': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 4}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 11}, 'SHA2': {'SHA-224': 2, 'SHA-256': 9, 'SHA-384': 3, 'SHA-512': 4}}, 'MD': {'MD5': {'MD5': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KA': {'KA': 2}}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'TLS': {'SSL': {'SSL': 16}, 'TLS': {'TLS': 34, 'TLS v1.1': 3, 'TLS v1.2': 1}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}, 'GCM': {'GCM': 3}, 'CCM': {'CCM': 10}}, 'ecc_curve': {'NIST': {'P-256': 4, 'P-384': 4, 'P-521': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 15}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 6}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 3}, 'X509': {'X.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'f217e25138dbc7404566c2bafb73e644091d51c3fd316a69ab10b6e889c60ef9', 'st_pdf_hash': '44be7484a3eb09e51bc273e44b486831fc8f74ac65cb84632a8cfbeef7397904', 'report_txt_hash': '2338c7be117762285a76c268e2c287ada9c6bc60ab8e053cc9853e2fb058e34d', 'st_txt_hash': '4dc334a465eb44bbecb2dda1c9b4028bc275064a30041d3aeb503346c00a9cc5'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 3}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_block_cipher_modes': {'__insert__': {'CCM': 10}}} data.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_cert_id': {'500 EWA 2019': 1}} data.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
    • The cert_id property was set to 500 EWA 2019.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['8.8.2.2']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Tripwire Enterprise v8.8.2.2 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Detection Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/500%20EWA%202019%20CT_no_sig_Eng%20v2.pdf",
  "dgst": "77ef42af7556edf5",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "500-EWA-2019",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "8.8.2.2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "certification_date": "2020-09-03",
      "level": "EAL 2+ (ALC_FLR.2)",
      "product": "Tripwire Enterprise Version 8.8.2.2\n\t\t\tTripwire Enterprise Version 8.9.1 (August 2022)",
      "vendor": "Tripwire, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2022-08-10",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20MR%20v1.0.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/500-EWA%20ST%20v1.1.pdf",
        "maintenance_title": "Tripwire Enterprise Version 8.9.1"
      }
    ]
  },
  "manufacturer": "Tripwire, Inc.",
  "manufacturer_web": "https://www.tripwire.com",
  "name": "Tripwire Enterprise v8.8.2.2",
  "not_valid_after": "2025-09-03",
  "not_valid_before": "2020-09-03",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "500 EWA 2019 CT_no_sig_Eng v2.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "500 EWA 2019": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA": 1,
          "EWA-Canada": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20190122115136-04\u002700\u0027",
      "/Creator": "Adobe Illustrator CC 22.0 (Windows)",
      "/ModDate": "D:20201023161231-05\u002700\u0027",
      "/Producer": "Adobe PDF library 15.00",
      "/Title": "cyber-centre-product-evaluation-certificate-e-bg",
      "pdf_file_size_bytes": 1640344,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "500 EWA 2019 CR v.1.0.pdf",
    "report_frontpage": {
      "CA": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "500 EWA 2019": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA": 1,
          "EWA-Canada": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20201005101229-04\u002700\u0027",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "D:20201005101251-05\u002700\u0027",
      "/Producer": "Foxit PhantomPDF Printer Version 9.7.1.2227",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 604236,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://cve.mitre.org/cve/",
          "https://www.tripwire.com/support/",
          "mailto:contact@cyber.gc.ca"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "Tripwire Enterprise 8.8.2.2 ST v1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDSA": {
            "ECDSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 3,
          "A.ASCOPE": 3,
          "A.DYNMIC": 3,
          "A.LOCATE": 3,
          "A.MANAGE": 3,
          "A.NOEVIL": 3,
          "A.NOTRST": 2,
          "A.NOTRUST": 1,
          "A.PROTCT": 3
        },
        "O": {
          "O.ACCESS": 12,
          "O.AUDITS": 8,
          "O.DAC": 5,
          "O.EADMIN": 4,
          "O.IDANLZ": 5,
          "O.IDAUTH": 19,
          "O.IDSCAN": 7,
          "O.IDSENS": 9,
          "O.INTEGR": 7,
          "O.OFLOWS": 6,
          "O.PROTCT": 9,
          "O.PROTECT": 1,
          "O.RESPON": 5
        },
        "OE": {
          "OE.AUDIT_PROTECTION": 4,
          "OE.AUDIT_SORT": 4,
          "OE.CREDEN": 5,
          "OE.INSTAL": 5,
          "OE.INTROP": 5,
          "OE.PERSON": 5,
          "OE.PHYCAL": 6,
          "OE.TIME": 6
        },
        "T": {
          "T.COMDIS": 3,
          "T.COMINT": 3,
          "T.FACCNT": 3,
          "T.FALACT": 3,
          "T.FALASC": 3,
          "T.FALREC": 3,
          "T.IMPCON": 4,
          "T.INADVE": 3,
          "T.INFLUX": 3,
          "T.LOSSOF": 3,
          "T.MISACT": 3,
          "T.MISUSE": 3,
          "T.NOHALT": 3,
          "T.PRIVIL": 3,
          "T.SCNCFG": 3,
          "T.SCNMLC": 3,
          "T.SCNVUL": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 12,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 6
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 5
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR": 3,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 8,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 7,
          "FAU_SAR.3.1": 1,
          "FAU_SEL": 1,
          "FAU_SEL.1": 8,
          "FAU_STG": 2,
          "FAU_STG.1": 1,
          "FAU_STG.2": 12,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.4": 7,
          "FAU_STG.4.1": 1
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 8,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.4": 6,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 18,
          "FCS_COP.1": 5
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 3,
          "FDP_ACC.2": 8,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 1,
          "FDP_ITC.1": 3,
          "FDP_ITC.2": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 10,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF": 18,
          "FMT_MOF.1": 3,
          "FMT_MSA": 3,
          "FMT_MSA.1": 9,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 12,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 1,
          "FMT_MTD.1": 11,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT": 1,
          "FPT_ITT.1": 7,
          "FPT_ITT.1.1": 1,
          "FPT_STM": 2,
          "FPT_STM.1": 1,
          "FPT_STM_EXT": 1,
          "FPT_STM_EXT.1": 10,
          "FPT_STM_EXT.1.1": 4
        },
        "FTA": {
          "FTA_SSL": 1,
          "FTA_SSL.4": 7,
          "FTA_SSL.4.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "GCM": {
          "GCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 16
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 5
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 45,
            "TLS v1.1": 3,
            "TLS v1.2": 1
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 4,
          "P-384": 4,
          "P-521": 4
        }
      },
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 5
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 10
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 8,
            "SHA-384": 3,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 2,
          "FIPS PUB 186-4": 3
        },
        "X509": {
          "X.509": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1,
            "HMAC-SHA-256": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 3
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 3
        },
        "Microsoft": {
          "Microsoft": 10
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Michelle Ruppel",
      "/CreationDate": "D:20200812121158-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20200812121158-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "DS_RCT",
      "pdf_file_size_bytes": 1014975,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 85
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/500%20EWA%202019%20CR%20v.1.0.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/Tripwire%20Enterprise%208.8.2.2%20ST%20v1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "54a66fd3c132a43cf53400a6dbcd18a16297a747c16d2e9a4d9590c8213c7d2d",
      "txt_hash": "ce565bb873632c5d0ac441278f1252f6a84adbe1d28b7ec37328eca5b68d882c"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f217e25138dbc7404566c2bafb73e644091d51c3fd316a69ab10b6e889c60ef9",
      "txt_hash": "2338c7be117762285a76c268e2c287ada9c6bc60ab8e053cc9853e2fb058e34d"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "44be7484a3eb09e51bc273e44b486831fc8f74ac65cb84632a8cfbeef7397904",
      "txt_hash": "4dc334a465eb44bbecb2dda1c9b4028bc275064a30041d3aeb503346c00a9cc5"
    }
  },
  "status": "active"
}