genugate 10.0 Firewall Software

CSV information ?

Status active
Valid from 22.06.2021
Valid until 21.06.2026
Scheme 🇩🇪 DE
Manufacturer genua GmbH
Category Network and Network-Related Devices and Systems
Security level EAL4+, ASE_TSS.2, AVA_VAN.5, ALC_FLR.2

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1154-2021

Certification report ?

Extracted keywords

Hash functions
SHA-256, SHA-512, SHA256, SHA512, SHA-384
Protocols
SSH, SSL, TLS, IPsec, VPN

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmented
Claims
A.PHYSEC, A.NOEVIL, A.ADMIN, A.LOCAL, A.REST, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSEC
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, ALC_PAM, AVA_VAN.5, ASE_TSS.2
Certificates
BSI-DSZ-CC-1154-2021, BSI-DSZ-CC-1039-2017
Evaluation facilities
secuvera
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision, v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision, v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS

Standards
FIPS PUB 180-4, PKCS#1, AIS 34, AIS 32, AIS 38, RFC 3447, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title: Zertifizierungsreport BSI-DSZ-CC-1154-2021
Subject: BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH
Keywords: "Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20210630113008+02'00'
Modification date: D:20210701114458+02'00'
Pages: 29
Creator: Writer
Producer: LibreOffice 6.3

Frontpage

Certificate ID: BSI-DSZ-CC-1154-2021
Certified item: genugate 10.0 Firewall Software
Certification lab: BSI
Developer: genua GmbH

References

Outgoing

Security target ?

Extracted keywords

Hash functions
SHA-384, SHA-256, SHA-512
Protocols
SSH, SSL, TLS, IPsec

Vendor
Microsoft

Security level
EAL4, EAL4 augmented
Claims
O.IDAUTH, O.MEDIAT, O.SECSTA, O.SELPRO, O.SECFUN, O.MISUSESSH, O.AUDREC, O.ACCOUN, O.AVAIL, O.PATCH, T.NOAUTH, T.SPOOF, T.MEDIAT, T.SELPRO, T.MISUSESSH, T.PATCH, A.PHYSEC, A.NOEVIL, A.ADMIN, A.LOCAL, A.REST, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSEC, OE.NOEVIL, OE.ADMIN, OE.LOCAL, OE.REST, OE.SINGEN, OE.POLICY, OE.TIMESTMP, OE.RTCLOCK, OE.HANET, OE.USER, OE.TRUSTK, OE.TRUSTU, OE.LEGACY, OE.REMOTE_AUTH, OE.OSPF, OE.PASSWD
Security Assurance Requirements (SAR)
ADV_INT, ADV_SPM, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_TDS.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_PAM, ALC_PAM.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, ATE_COV.1, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_UPD, FAU_ARP, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_STG, FAU_STG.1, FAU_STG.4, FCS_COP.1, FCS_COP, FCS_COP.1.1, FCS_CKM.4, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_ITC.1, FIA_UAU, FIA_UAU.5, FIA_UAU.1, FIA_UAU.2, FIA_UAU.3, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_AFL, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF, FMT_MOF.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.3, FMT_SMR.3.1, FMT_SMR.1, FMT_IFF, FMT_MOF.1.3, FPT_SST, FPT_UPD, FPT_STM.1, FPT_RCV, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_STM, FPT_STM.1.1, FPT_TRC, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_ITT.1, FPT_TST.1, FPT_AMT.1
Certification process
out of scope, genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same

Side-channel analysis
side channel
Certification process
out of scope, genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same

Standards
FIPS PUB 180-4, PKCS#1, RFC 4251, ISO/IEC 18045, CCMB-2017-04-002

File metadata

Title: genugate 10.0 Security Target
Subject: Common Criteria certification
Keywords: firewall, application level gateway, packet filter
Author: genua GmbH
Creation date: D:20210616140218+02'00'
Modification date: D:20210616140218+02'00'
Pages: 81
Creator: LaTeX with hyperref
Producer: GPL Ghostscript 9.53.3

References

Outgoing

Heuristics ?

Certificate ID: BSI-DSZ-CC-1154-2021

Extracted SARs

ASE_OBJ.2, ADV_FSP.4, ALC_TAT.1, ADV_IMP.1, ASE_TSS.2, ALC_FLR.2, ADV_ARC.1, ALC_PAM.1, ALC_DEL.1, ADV_TDS.3, ALC_DVS.1, AVA_VAN.5, ASE_REQ.2, ALC_CMS.4, ATE_FUN.1, ATE_COV.2, ADV_TAT.1, ASE_CCL.1, ATE_DPT.1, ASE_ECD.1, AGD_OPE.1, ALC_CMC.4, AGD_PRE.1, ASE_SPD.1, ATE_IND.2, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name genugate 10.0 Firewall Software was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['10.0']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1039-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0890-2013', 'BSI-DSZ-CC-1039-2017', 'BSI-DSZ-CC-0718-2012']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_PAM', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '86f2e0bcc7b11465da147358585db0557864c6ee3cc3c4b8f66697ed4f81f005', 'st_pdf_hash': '96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a', 'report_txt_hash': '9fac66d6037ff7ad36d6794c98da55311ba1c1ab1cc70583ddce0f44e8d49817', 'st_txt_hash': '9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 2, 'SHA-256': 2, 'SHA-512': 2, 'SHA256': 38, 'SHA512': 38, 'SHA-384': 1}, 'rules_crypto_schemes': {'TLS': 1, 'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-384': 3, 'SHA-512': 2, 'SHA-256': 1}, 'rules_crypto_schemes': {'TLS': 5, 'SSL': 4}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'side channel': 29}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/', 'https://www.sogis.eu/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.openssh.org', 'http://www.ietf.org/rfc/rfc4251.txt']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1154-2021': 58, 'BSI-DSZ-CC-1039-2017': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 7, 'EAL 5': 3, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4, 'ALC_PAM.1': 5, 'ALC_FLR': 3, 'ALC_PAM': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_TSS.2': 5}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 2, 'A.REST': 2, 'A.SINGEN': 2, 'A.POLICY': 3, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 1}}, 'vendor': {'STMicroelectronics': {'STM': 2}}, 'eval_facility': {'secuvera': {'secuvera': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA-256': 2, 'SHA-512': 2, 'SHA256': 38, 'SHA512': 38, 'SHA-384': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}, 'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 4}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS 34': 2, 'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC 3447': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'ical Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision': 1, 'ion v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_ARC.1': 5, 'ADV_FSP': 1, 'ADV_FSP.4': 3, 'ADV_IMP': 1, 'ADV_IMP.1': 4, 'ADV_TDS': 1, 'ADV_TDS.3': 4, 'ADV_FSP.1': 2, 'ADV_TDS.1': 2, 'ADV_TAT.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_OPE.1': 6, 'AGD_PRE': 1, 'AGD_PRE.1': 4}, 'ALC': {'ALC_PAM': 8, 'ALC_FLR.2': 7, 'ALC_PAM.1': 5, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.4': 2, 'ALC_DEL': 2, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_DVS.1': 3, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 3, 'ALC_TAT': 1, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 2, 'ATE_DPT': 1, 'ATE_DPT.1': 2, 'ATE_FUN': 1, 'ATE_FUN.1': 5, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 4, 'ASE_INT': 1, 'ASE_INT.1': 4, 'ASE_OBJ': 1, 'ASE_OBJ.2': 3, 'ASE_REQ': 1, 'ASE_REQ.2': 2, 'ASE_SPD': 1, 'ASE_SPD.1': 3, 'ASE_TSS': 1, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 7, 'FAU_GEN.1': 15, 'FAU_GEN.2': 1, 'FAU_ARP': 1, 'FAU_ARP.1': 6, 'FAU_ARP.1.1': 1, 'FAU_SAA': 1, 'FAU_SAA.1': 7, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 1, 'FAU_SAR.1': 10, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 6, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 6, 'FAU_SAR.3.1': 1, 'FAU_STG': 1, 'FAU_STG.1': 2}, 'FCS': {'FCS_COP.1': 10, 'FCS_COP': 1, 'FCS_COP.1.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_IFC': 1, 'FDP_IFF': 1, 'FDP_ITC.1': 1}, 'FIA': {'FIA_UAU': 4, 'FIA_UAU.5': 7, 'FIA_UAU.1': 3, 'FIA_UAU.2': 7, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 7, 'FIA_UAU.7': 1, 'FIA_AFL': 1, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 1, 'FIA_ATD.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS': 1, 'FIA_SOS.1': 6, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 1, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 4}, 'FMT': {'FMT_MOF': 1, 'FMT_MSA': 1, 'FMT_MTD': 1, 'FMT_SMF': 1, 'FMT_SMF.1': 15, 'FMT_SMF.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.2': 19, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 13, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 5, 'FPT_UPD': 6, 'FPT_STM.1': 9, 'FPT_RCV': 1, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_STM': 1, 'FPT_STM.1.1': 1, 'FPT_TRC': 1, 'FPT_TRC.1': 5, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_ITT.1': 2, 'FPT_TST.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 15, 'O.MEDIAT': 16, 'O.SECSTA': 8, 'O.SELPRO': 5, 'O.SECFUN': 22, 'O.MISUSESSH': 10, 'O.AUDREC': 17, 'O.ACCOUN': 9, 'O.AVAIL': 8, 'O.PATCH': 8, 'O.SELFPRO': 2}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2, 'T.PATCH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 3, 'A.REST': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 2, 'OE.ADMIN': 2, 'OE.LOCAL': 2, 'OE.REST': 2, 'OE.SINGEN': 2, 'OE.POLICY': 2, 'OE.TIMESTMP': 3, 'OE.RTCLOCK': 3, 'OE.HANET': 4, 'OE.USER': 2, 'OE.TRUSTK': 4, 'OE.TRUSTU': 2, 'OE.LEGACY': 2, 'OE.REMOTE_AUTH': 2, 'OE.OSPF': 2, 'OE.PASSWD': 3}}, 'vendor': {'STMicroelectronics': {'STM': 19}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-384': 3, 'SHA-512': 2, 'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 34}, 'TLS': {'SSL': {'SSL': 4}, 'TLS': {'TLS': 5}}, 'IPsec': {'IPsec': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 29, 'SPA': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 3}, 'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 4251': 1}, 'ISO': {'ISO/IEC 18045': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, ', genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_PAM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '1154a_pdf.pdf', 'st_filename': '1154b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1154-2021': 30, 'BSI-DSZ-CC-1039-2017': 6}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 8}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_PAM.1': 13, 'ALC_PAM': 3}}, 'AVA': {'__update__': {'AVA_VAN.5': 5}}}}, 'vendor': {}, 'eval_facility': {'__update__': {'secuvera': {'__update__': {'secuvera': 3}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA256': 36, 'SHA512': 36}}}, '__delete__': ['SHA1']}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__update__': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision': 1, 'v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 4}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 4, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_TDS.1': 1}}, 'AGD': {'__update__': {'AGD_OPE.1': 5, 'AGD_PRE.1': 3}}, 'ALC': {'__update__': {'ALC_PAM': 32, 'ALC_FLR.2': 5, 'ALC_PAM.1': 48, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL': 3, 'ALC_DEL.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 1}, '__delete__': ['ALC_CMS.1']}, 'ATE': {'__update__': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 4, 'ATE_IND.2': 1, 'ATE_COV.1': 1}}, 'ASE': {'__update__': {'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_UPD': 1, 'FAU_STG.4': 2}, '__update__': {'FAU_GEN': 33, 'FAU_GEN.1': 16, 'FAU_ARP': 2, 'FAU_SAA': 2, 'FAU_SAR': 4, 'FAU_SAR.1': 8, 'FAU_STG': 31, 'FAU_STG.1': 7}}, 'FCS': {'__update__': {'FCS_COP.1': 11, 'FCS_COP': 2, 'FCS_CKM.4': 2}}, 'FDP': {'__insert__': {'FDP_IFC.1': 5, 'FDP_IFF.1': 25}, '__update__': {'FDP_IFC': 60, 'FDP_IFF': 52, 'FDP_ITC.1': 2}}, 'FIA': {'__update__': {'FIA_UAU': 28, 'FIA_UAU.5': 8, 'FIA_UAU.1': 2, 'FIA_UAU.2': 8, 'FIA_AFL': 2, 'FIA_ATD': 2, 'FIA_SOS': 2, 'FIA_UID': 3, 'FIA_UID.1': 3}}, 'FMT': {'__insert__': {'FMT_MOF.1': 3, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD.1': 2, 'FMT_IFF': 2}, '__update__': {'FMT_MOF': 21, 'FMT_MSA': 68, 'FMT_MTD': 15, 'FMT_SMF': 2, 'FMT_SMF.1': 24, 'FMT_SMR': 5, 'FMT_SMR.1': 25}}, 'FPT': {'__insert__': {'FPT_AMT.1': 1}, '__update__': {'FPT_SST': 22, 'FPT_UPD': 42, 'FPT_RCV': 2, 'FPT_STM': 2, 'FPT_TRC': 3, 'FPT_ITT.1': 1, 'FPT_TST.1': 2}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.MEDIAT': 13, 'O.SELPRO': 4, 'O.MISUSESSH': 7, 'O.ACCOUN': 6, 'O.PATCH': 5}, '__delete__': ['O.SELFPRO']}, 'OE': {'__update__': {'OE.NOEVIL': 1, 'OE.LOCAL': 1, 'OE.SINGEN': 1, 'OE.TIMESTMP': 2, 'OE.HANET': 3, 'OE.TRUSTK': 3, 'OE.LEGACY': 1, 'OE.OSPF': 1}}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 3}}}}}}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 26}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 3}}}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'side channel': 31}, '__delete__': ['SPA']}}}, 'standard_id': {'__insert__': {'CC': {'CCMB-2017-04-002': 1}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same': 1}, '__delete__': [', genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same']}}}} data.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 1}}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/1154c_pdf.pdf",
  "dgst": "96106c2d31eea8b2",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "BSI-DSZ-CC-1154-2021",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_PAM",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10.0"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1039-2017"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1039-2017",
          "BSI-DSZ-CC-0718-2012",
          "BSI-DSZ-CC-0890-2013"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "genua GmbH",
  "manufacturer_web": "https://www.genua.de",
  "name": "genugate 10.0 Firewall Software",
  "not_valid_after": "2026-06-21",
  "not_valid_before": "2021-06-22",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "1154a_pdf.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cc_security_level": "Common Criteria Part 3 extended EAL 4 augmented by ASE_TSS.2, ALC_FLR.2, ALC_PAM.1, AVA_VAN.5",
        "cc_version": "Product specific Security Target Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1154-2021",
        "cert_item": "genugate 10.0 Firewall Software",
        "cert_lab": "BSI",
        "developer": "genua GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "None"
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1039-2017": 6,
          "BSI-DSZ-CC-1154-2021": 30
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.HANET": 2,
          "A.LEGACY": 2,
          "A.LOCAL": 2,
          "A.NOEVIL": 2,
          "A.OSPF": 2,
          "A.PHYSEC": 2,
          "A.POLICY": 3,
          "A.REMOTE_AUTH": 2,
          "A.REST": 2,
          "A.SINGEN": 2,
          "A.TIMESTMP": 2,
          "A.TRUSTK": 2,
          "A.TRUSTU": 2,
          "A.USER": 2
        },
        "OE": {
          "OE.PHYSEC": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 3,
          "ALC_FLR.2": 4,
          "ALC_PAM": 3,
          "ALC_PAM.1": 13
        },
        "ASE": {
          "ASE_TSS.2": 5
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 8,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe M\u00e4rz 2021, Revision": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically \u2022 AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema \u2022 AIS": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 5
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "secuvera": {
          "secuvera": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2,
            "SHA-384": 1,
            "SHA-512": 2,
            "SHA256": 36,
            "SHA512": 36
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 4
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 3447": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20210630113008+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH\"",
      "/ModDate": "D:20210701114458+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH",
      "/Title": "Zertifizierungsreport BSI-DSZ-CC-1154-2021",
      "pdf_file_size_bytes": 637521,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/",
          "https://www.sogis.eu/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1154b_pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.HANET": 2,
          "A.LEGACY": 2,
          "A.LOCAL": 3,
          "A.NOEVIL": 2,
          "A.OSPF": 2,
          "A.PHYSEC": 2,
          "A.POLICY": 2,
          "A.REMOTE_AUTH": 2,
          "A.REST": 2,
          "A.SINGEN": 3,
          "A.TIMESTMP": 2,
          "A.TRUSTK": 2,
          "A.TRUSTU": 2,
          "A.USER": 2
        },
        "O": {
          "O.ACCOUN": 6,
          "O.AUDREC": 17,
          "O.AVAIL": 8,
          "O.IDAUTH": 15,
          "O.MEDIAT": 13,
          "O.MISUSESSH": 7,
          "O.PATCH": 5,
          "O.SECFUN": 22,
          "O.SECSTA": 8,
          "O.SELPRO": 4
        },
        "OE": {
          "OE.ADMIN": 2,
          "OE.HANET": 3,
          "OE.LEGACY": 1,
          "OE.LOCAL": 1,
          "OE.NOEVIL": 1,
          "OE.OSPF": 1,
          "OE.PASSWD": 3,
          "OE.PHYSEC": 2,
          "OE.POLICY": 2,
          "OE.REMOTE_AUTH": 2,
          "OE.REST": 2,
          "OE.RTCLOCK": 3,
          "OE.SINGEN": 1,
          "OE.TIMESTMP": 2,
          "OE.TRUSTK": 3,
          "OE.TRUSTU": 2,
          "OE.USER": 2
        },
        "T": {
          "T.MEDIAT": 2,
          "T.MISUSESSH": 2,
          "T.NOAUTH": 2,
          "T.PATCH": 2,
          "T.SELPRO": 2,
          "T.SPOOF": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 4,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 3,
          "ADV_FSP.4": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 3,
          "ADV_INT": 2,
          "ADV_SPM": 2,
          "ADV_TAT.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 5,
          "AGD_PRE": 1,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL": 3,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_FLR": 1,
          "ALC_FLR.2": 5,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_PAM": 32,
          "ALC_PAM.1": 48,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 3,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.2": 4
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 4,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 2,
          "FAU_ARP.1": 6,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 33,
          "FAU_GEN.1": 16,
          "FAU_GEN.2": 1,
          "FAU_SAA": 2,
          "FAU_SAA.1": 7,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR": 4,
          "FAU_SAR.1": 8,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 6,
          "FAU_SAR.3.1": 1,
          "FAU_STG": 31,
          "FAU_STG.1": 7,
          "FAU_STG.4": 2,
          "FAU_UPD": 1
        },
        "FCS": {
          "FCS_CKM.4": 2,
          "FCS_COP": 2,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_IFC": 60,
          "FDP_IFC.1": 5,
          "FDP_IFF": 52,
          "FDP_IFF.1": 25,
          "FDP_ITC.1": 2
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 2,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 2,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 28,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.3": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 8,
          "FIA_UAU.6": 7,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 3,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_IFF": 2,
          "FMT_MOF": 21,
          "FMT_MOF.1": 3,
          "FMT_MOF.1.3": 1,
          "FMT_MSA": 68,
          "FMT_MSA.1": 4,
          "FMT_MSA.3": 3,
          "FMT_MTD": 15,
          "FMT_MTD.1": 2,
          "FMT_SMF": 2,
          "FMT_SMF.1": 24,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 5,
          "FMT_SMR.1": 25,
          "FMT_SMR.2": 19,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1,
          "FMT_SMR.3": 6,
          "FMT_SMR.3.1": 1
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_ITT.1": 1,
          "FPT_RCV": 2,
          "FPT_RCV.2": 6,
          "FPT_RCV.2.1": 1,
          "FPT_RCV.2.2": 1,
          "FPT_SST": 22,
          "FPT_STM": 2,
          "FPT_STM.1": 9,
          "FPT_STM.1.1": 1,
          "FPT_TRC": 3,
          "FPT_TRC.1": 5,
          "FPT_TRC.1.1": 1,
          "FPT_TRC.1.2": 1,
          "FPT_TST.1": 2,
          "FPT_UPD": 42
        }
      },
      "certification_process": {
        "OutOfScope": {
          "genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 2
        },
        "SSH": {
          "SSH": 26
        },
        "TLS": {
          "SSL": {
            "SSL": 3
          },
          "TLS": {
            "TLS": 5
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 3,
            "SHA-384": 3,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side channel": 31
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-002": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 3
        },
        "ISO": {
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 3
        },
        "RFC": {
          "RFC 4251": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "genua GmbH",
      "/CreationDate": "D:20210616140218+02\u002700\u0027",
      "/Creator": "LaTeX with hyperref",
      "/Keywords": "firewall, application level gateway, packet filter",
      "/ModDate": "D:20210616140218+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.53.3",
      "/Subject": "Common Criteria certification",
      "/Title": "genugate 10.0 Security Target",
      "pdf_file_size_bytes": 460773,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.openssh.org",
          "http://www.ietf.org/rfc/rfc4251.txt"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 81
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1154a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ASE_TSS.2",
      "AVA_VAN.5",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1154b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "86f2e0bcc7b11465da147358585db0557864c6ee3cc3c4b8f66697ed4f81f005",
    "report_txt_hash": "9fac66d6037ff7ad36d6794c98da55311ba1c1ab1cc70583ddce0f44e8d49817",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a",
    "st_txt_hash": "9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495"
  },
  "status": "active"
}