Security Threat Exclusion System SHIELD/ExLink-IA 1.0

CSV information ?

Status archived
Valid from 22.03.2007
Valid until 07.10.2013
Scheme 🇯🇵 JP
Manufacturer Hitachi Information Systems, Ltd
Category Network and Network-Related Devices and Systems
Security level EAL1

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0090

Certificate ?

Certification report ?

Extracted keywords

Security level
EAL1
Certificates
Certification No. C0090
Evaluation facilities
Information Technology Security Center

File metadata

Title: untitled
Creation date: D:20070323205523+09'00'
Modification date: D:20070323205523+09'00'
Pages: 1
Producer: Acrobat Distiller 6.0 (Windows)

References

No references.

Security target ?

References

No references.

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0090

Scheme data ?

Cert Id C0090
Supplier Hitachi Information Systems, Ltd
Toe Overseas Name -----
Claim EAL1
Certification Date 2007-03
Toe Overseas Link None
Toe Japan Name Security Threat Exclusion System SHIELD/ExLink-IA 1.0
Toe Japan Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0090_it6114.html
Enhanced
Product Security Threat Exclusion System SHIELD/ExLink-IA
Toe Version 1.0
Product Type IT Product (Security Management Software)
Certification Date 2007-03-22
Assurance Level EAL1
Vendor Hitachi Information Systems, Ltd
Evaluation Facility Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSEC)
Description PRODUCT DESCRIPTION This product is a network management software that collects security logs from monitored FWs (*1) and IPSs(*2), sends them to SOC(*3) for analysis, and changes the FW's settings based on the instructions from SOC. (*1) abbreviation of Firewall. Network server that protects internal network resources from external network. (*2) abbreviation of Intrusion Prevention System. Software tool that prevents unauthorized access to server and network. It extends a function of IDS to detect unauthorized access, and take countermeasures such as blocking connections in real-time when detected. (*3) abbreviation of Security Operation Center. Facilities that receives security logs from SHIELD/ExLink-IAs and maintains an application software called "i-Monitor" to issue instructions to change FW's settings to HIELD/ExLink-IAs.

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '166372c405bb530a8bd7cb0b70031719c0d03622771498515d18b283ec9b9bba', 'txt_hash': 'f75e12ef29347b004fb42a1c8f5e6d189a0568b19087b83c25e27a60d5b2f0ad'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {}.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0090.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cert_id property was set to C0090.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0090.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 20.06.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'supplier': 'Hitachi Information Systems, Ltd'} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'C0090', 'supplier': 'Hitachi Information\n Systems, Ltd', 'toe_overseas_name': '-----', 'claim': 'EAL1', 'certification_date': '2007-03', 'toe_overseas_link': None, 'toe_japan_name': 'Security Threat Exclusion\n System SHIELD/ExLink-IA\n 1.0', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0090_it6114.html', 'enhanced': {'product': 'Security Threat Exclusion System SHIELD/ExLink-IA', 'toe_version': '1.0', 'product_type': 'IT Product (Security Management Software)', 'certification_date': '2007-03-22', 'assurance_level': 'EAL1', 'vendor': 'Hitachi Information Systems, Ltd', 'evaluation_facility': 'Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSEC)', 'description': 'PRODUCT DESCRIPTION This product is a network management software that collects security logs from monitored FWs (*1) and IPSs(*2), sends them to SOC(*3) for analysis, and changes the FW\'s settings based on the instructions from SOC. (*1) abbreviation of Firewall. Network server that protects internal network resources from external network. (*2) abbreviation of Intrusion Prevention System. Software tool that prevents unauthorized access to server and network. It extends a function of IDS to detect unauthorized access, and take countermeasures such as blocking connections in real-time when detected. (*3) abbreviation of Security Operation Center. Facilities that receives security logs from SHIELD/ExLink-IAs and maintains an application software called "i-Monitor" to issue instructions to change FW\'s settings to HIELD/ExLink-IAs.'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was updated.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was updated, with the [[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0090_ecvr.pdf, code: 408']] values inserted.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/, code: nok'].

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'c0090_ecvr.pdf', 'st_filename': None}.

    The computed heuristics were updated.

    • The cert_id property was set to C0090.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'Certification No. C0090': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_id property was set to Certification No. C0090.
  • 29.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_pdf_hash': None, 'st_txt_hash': None}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '166372c405bb530a8bd7cb0b70031719c0d03622771498515d18b283ec9b9bba', 'report_txt_hash': 'f75e12ef29347b004fb42a1c8f5e6d189a0568b19087b83c25e27a60d5b2f0ad'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0090_ecvr.pdf, code: nok'].

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': None}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Security Threat Exclusion System SHIELD/ExLink-IA 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "837e4f5a5bdfdd76",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0090",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "C0090",
      "certification_date": "2007-03",
      "claim": "EAL1",
      "enhanced": {
        "assurance_level": "EAL1",
        "certification_date": "2007-03-22",
        "description": "PRODUCT DESCRIPTION This product is a network management software that collects security logs from monitored FWs (*1) and IPSs(*2), sends them to SOC(*3) for analysis, and changes the FW\u0027s settings based on the instructions from SOC.    (*1) abbreviation of Firewall. Network server that protects internal network resources from external network.  (*2) abbreviation of Intrusion Prevention System. Software tool that prevents unauthorized access to server and network. It extends a function of IDS to detect unauthorized access, and take countermeasures such as blocking connections in real-time when detected.  (*3) abbreviation of Security Operation Center. Facilities that receives security logs from SHIELD/ExLink-IAs and maintains an application software called \"i-Monitor\" to issue instructions to change FW\u0027s settings to HIELD/ExLink-IAs.",
        "evaluation_facility": "Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSEC)",
        "product": "Security Threat Exclusion System SHIELD/ExLink-IA",
        "product_type": "IT Product (Security Management Software)",
        "toe_version": "1.0",
        "vendor": "Hitachi Information Systems, Ltd"
      },
      "supplier": "Hitachi Information                    Systems, Ltd",
      "toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0090_it6114.html",
      "toe_japan_name": "Security Threat Exclusion\n                    System SHIELD/ExLink-IA\n                    1.0",
      "toe_overseas_link": null,
      "toe_overseas_name": "-----"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Hitachi Information Systems, Ltd",
  "manufacturer_web": "https://www.hitachijoho.com/",
  "name": "Security Threat Exclusion System SHIELD/ExLink-IA 1.0",
  "not_valid_after": "2013-10-07",
  "not_valid_before": "2007-03-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0090_ecvr.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "Certification No. C0090": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL1": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ITSC": {
          "Information Technology Security Center": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20070323205523+09\u002700\u0027",
      "/ModDate": "D:20070323205523+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "untitled",
      "pdf_file_size_bytes": 13145,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0090_ecvr.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "166372c405bb530a8bd7cb0b70031719c0d03622771498515d18b283ec9b9bba",
      "txt_hash": "f75e12ef29347b004fb42a1c8f5e6d189a0568b19087b83c25e27a60d5b2f0ad"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "archived"
}