RSA Archer Suite v6.3

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 30.05.2018
Valid until 30.05.2023
Scheme 🇲🇾 MY
Manufacturer RSA Security LLC
Category Other Devices and Systems
Security level EAL2+, ALC_FLR.2

Heuristics summary ?

Certificate ID: ISCB-5-RPT-C095-CR-v1

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL

Vendor
Microsoft

Security level
EAL2, EAL 2
Security Assurance Requirements (SAR)
ALC_FLR.2, ATE_IND.2, AVA_VAN.2
Security Functional Requirements (SFR)
FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_SAR.2.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.6.1, FIA_UID.2.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_REV.1.1, FMT_REV.1.2, FMT_MOF.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTA_TSE.1.1
Certificates
ISCB-5-RPT-C095-CR-v1
Evaluation facilities
Leidos

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Title: C095 Certification Report
Subject: RSA Archer Suite v6.3
Keywords: MyCB_TMP_002
Author: ISCB Department
Creation date: D:20180601030646+00'00'
Modification date: D:20180601030646+00'00'
Pages: 30
Creator: Microsoft Word

References

No references.

Security target ?

Extracted keywords

Vendor
Microsoft

Security level
EAL2, EAL 2, EAL 2 augmented
Claims
O.ACCESS_CONTROL, O.AUDIT, O.AUDIT_REVIEW, O.I_AND_A, O.LOGON_BANNER, O.PASSWORD_CONTROLS, O.SECURITY_MANAGEMENT, O.SESSION_LIMITATION, O.SESSION_TERMINATION, O.THROTTLE, T.BRUTE_FORCE, T.DATA_COMPROMISE, T.INAPPROPRIATE_USE, T.NO_ACCOUNTABILITY, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACTIVITY, T.INAPPRORIATE_USE, A.MANAGE, A.PROTECT, A.SECURE_COMMS, A.TIME, A.CRYPTO, OE.PHYSICAL, OE.PERSONNEL, OE.SECURE_COMMS, OE.TIME, OE.CRYPTO
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MOF, FMT_MSA, FMT_MTD, FMT_REV, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_REV.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_SSL, FTA_TAB, FTA_TSE, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL.4, FTA_SSL.4.1, FTA_TAB.1, FTA_TAB.1.1, FTA_TSE.1, FTA_TSE.1.1

Standards
FIPS 140-2

File metadata

Title: RSA Archer GRC
Subject: Security Target
Author: Apted, Tony J. [RA]
Creation date: D:20180520140131+00'00'
Modification date: D:20180520140131+00'00'
Pages: 42
Creator: Microsoft Word

References

No references.

Heuristics ?

Certificate ID: ISCB-5-RPT-C095-CR-v1

Extracted SARs

ASE_TSS.1, ATE_COV.1, AGD_PRE.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ADV_FSP.2, ALC_DEL.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ASE_SPD.1, ASE_CCL.1, AVA_VAN.2, ADV_TDS.1, ALC_CMS.2, ALC_FLR.2, ASE_OBJ.2, ASE_INT.1, ADV_ARC.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2019-3756
C M N
MEDIUM 6.5 3.6 18.09.2019 23:15
CVE-2019-3758
C M N
CRITICAL 9.8 5.9 18.09.2019 23:15
CVE-2020-5331
C M N
MEDIUM 5.5 3.6 04.05.2020 19:15
CVE-2020-5332
C M N
HIGH 7.2 5.9 04.05.2020 19:15
CVE-2020-5333
C M N
MEDIUM 4.3 1.4 04.05.2020 19:15
CVE-2020-5334
C M N
MEDIUM 6.1 2.7 04.05.2020 19:15
CVE-2020-5335
C M N
HIGH 8.8 5.9 04.05.2020 19:15
CVE-2020-5336
C M N
MEDIUM 6.1 2.7 04.05.2020 19:15
CVE-2020-5337
C M N
MEDIUM 6.1 2.7 04.05.2020 19:15
CVE-2021-33615
C M N
HIGH 7.5 5.9 02.06.2022 14:15
CVE-2021-33616
C M N
MEDIUM 5.4 2.7 04.04.2022 12:15
CVE-2021-38362
C M N
MEDIUM 6.5 3.6 30.03.2022 22:15
CVE-2021-41594
C M N
MEDIUM 6.5 3.6 30.03.2022 00:15
CVE-2022-26947
C M N
MEDIUM 5.4 2.7 30.03.2022 00:15
CVE-2022-26948
C M N
HIGH 7.5 3.6 30.03.2022 00:15
CVE-2022-26949
C M N
MEDIUM 6.5 3.6 30.03.2022 00:15
CVE-2022-26950
C M N
MEDIUM 6.1 2.7 30.03.2022 00:15
CVE-2022-26951
C M N
MEDIUM 6.1 2.7 30.03.2022 00:15
CVE-2022-30584
C M N
HIGH 8.8 5.9 26.05.2022 20:15
CVE-2022-30585
C M N
MEDIUM 6.5 3.6 26.05.2022 20:15
CVE-2022-37317
C M N
MEDIUM 5.4 2.7 25.08.2022 23:15

Scheme data ?

Cert No 2020-006-C113
Developer RSA Security LLC
Level EAL2+ ALC_FLR.2
Product RSA Archer Suite v6.7
Certification Date 24-11-2017
Expiration Date 24-11-2022
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/139
Enhanced
Cert Id C113
Product RSA Archer Suite v6.7
Developer 13200 Metcalf Avenue,Suite 300 Overland Park,Kansas 66213,The United States of America Name & Tel: Jeremy Fisher (913-549-1565)Email: Jeremy.fisher@rsa.comWebsite: https://www.rsa.com/
Category Other Devices and Systems
Type Other Devices and Systems
Scope The Target of Evaluation (TOE) is RSA Archer Suite v6.7. It is a software product that supports business-level management of governance, risk management and compliance. Users access the TOE via a web-based graphical user interface (GUI). All users require an account in order to log on to the TOE. The user account specifies the user’s groups and access roles. An access role is a collection of application-level and page-level rights that an administrator can create and assign to any number of users and groups to control user privileges (create, read, update, and delete). The Content API, Web Services API and RESTful APIs programmatically extend the functionality of the TOE to external applications through several classes and methods which expose many of its features, allowing for a high level of integration with other products. All users must be successfully identified and authenticated by the TOE before gaining access to any other TOE services.
Assurance Level EAL2+ ALC_FLR.2
Certification Date 24-11-2017
Expiration Date 24-11-2022
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C113/RSA_Archer_6.7_ST_v1.0_09-29-2020.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C113/ISCB-5-RPT-C113-CR-V1.pdf
Status Archive

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '52acafb80f2d3cc3a76ac88c2bb719786f1f4eee44c265b57321c8bd2c14bce5', 'txt_hash': '39e895b2354c22240d672c832d35c0936165d16b79f5b2fc60e8cefc19b2218c'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a0818a3ace4bd09de6e773bae73c707cf98ae59839749222ffe6c76fc8edd9a8', 'txt_hash': '4cffac45b6c7a7f21dd82cc6a30844a34bc31465c94e652038d04cf290affed8'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was set to {'cert_no': '2020-006-C113', 'developer': 'RSA Security LLC', 'level': 'EAL2+ ALC_FLR.2', 'product': 'RSA Archer Suite v6.7', 'certification_date': '24-11-2017', 'expiration_date': '24-11-2022', 'recognition': 'CCRA', 'url': 'https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/139', 'enhanced': {'cert_id': 'C113', 'product': 'RSA Archer Suite v6.7', 'developer': '13200 Metcalf Avenue,Suite 300 Overland Park,Kansas 66213,The United States of America\nName & Tel: Jeremy Fisher (913-549-1565)Email: Jeremy.fisher@rsa.comWebsite: https://www.rsa.com/', 'category': 'Other Devices and Systems', 'type': 'Other Devices and Systems', 'scope': 'The Target of Evaluation (TOE) is RSA Archer Suite v6.7. It is a software product that supports business-level management of governance, risk management and compliance. Users access the TOE via a web-based graphical user interface (GUI). All users require an account in order to log on to the TOE. The user account specifies the user’s groups and access roles. An access role is a collection of application-level and page-level rights that an administrator can create and assign to any number of users and groups to control user privileges (create, read, update, and delete). The Content API, Web Services API and RESTful APIs programmatically extend the functionality of the TOE to external applications through several classes and methods which expose many of its features, allowing for a high level of integration with other products. All users must be successfully identified and authenticated by the TOE before gaining access to any other TOE services.', 'assurance_level': 'EAL2+ ALC_FLR.2', 'certification_date': '24-11-2017', 'expiration_date': '24-11-2022', 'mutual_recognition': 'CCRA', 'target_link': 'https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C113/RSA_Archer_6.7_ST_v1.0_09-29-2020.pdf', 'report_link': 'https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C113/ISCB-5-RPT-C113-CR-V1.pdf', 'status': 'Archive'}}.
  • 20.06.2023 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.

    The Valid until date was updated.

    • The new value is 2023-05-30.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'category': 'NETWORK AND NETWORK-RELATED DEVICES AND SYSTEMS', 'level': 'EAL 2+ ALC_FLR.2', 'cert_id': '2016-003-C073', 'certification_date': '14 September 2016', 'product': 'PROJECT IDC073ASSURANCE LEVELEAL2+ ALC_FLR.2Security Target (ST)Certification Report (CR)PRODUCT NAME AND VERSIONRSA Archer GRC Platform version 6.1PRODUCT TYPENetwork and Network related Devices and SystemsPRODUCT SPONSOR / DEVELOPERRSA Security LLCPRODUCT SPONSOR / DEVELOPER CONTACT DETAILSJon L. GoodwinManager, Federal ProgramsRSA Security LLC10700 Parkridge Blvd.Suite 600Reston, VA 20191URL: www.rsa.comEmail: This email address is being protected from spambots. You need JavaScript enabled to view it.Cell: 469-855-5658It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls.The following security functions are implemented by the TOE:Security AuditUser Data ProtectionIdentification adn AuthenticationSecurity ManagementTOE AccessRSA Archer GRC Platform version 6.1', 'developer': 'RSA Security LLC'}}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2020-5333', 'CVE-2019-3756', 'CVE-2022-26947', 'CVE-2019-3758', 'CVE-2022-26948', 'CVE-2020-5331', 'CVE-2022-26951', 'CVE-2021-38362', 'CVE-2020-5336', 'CVE-2021-33615', 'CVE-2021-33616', 'CVE-2022-37317', 'CVE-2022-30584', 'CVE-2020-5335', 'CVE-2022-30585', 'CVE-2022-26950', 'CVE-2021-41594', 'CVE-2022-26949', 'CVE-2020-5337', 'CVE-2020-5334', 'CVE-2020-5332']}.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was set to None.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2020-5331', 'CVE-2020-5333', 'CVE-2020-5336', 'CVE-2020-5337', 'CVE-2020-5334', 'CVE-2020-5332', 'CVE-2020-5335']} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to a0818a3ace4bd09de6e773bae73c707cf98ae59839749222ffe6c76fc8edd9a8.
    • The st_txt_hash property was set to 4cffac45b6c7a7f21dd82cc6a30844a34bc31465c94e652038d04cf290affed8.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 845765, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/Title': 'RSA Archer GRC', '/Author': 'Apted, Tony J. [RA]', '/Subject': 'Security Target', '/Creator': 'Microsoft Word', '/CreationDate': "D:20180520140131+00'00'", '/ModDate': "D:20180520140131+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 3, 'EAL 2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.2': 11, 'ADV_TDS.1': 11}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 16, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_FLR': 1, 'ALC_CMC.2': 8, 'ALC_CMS.2': 6, 'ALC_DEL.1': 5}, 'ATE': {'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.2': 7}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 14, 'ASE_ECD.1': 10, 'ASE_INT.1': 12, 'ASE_OBJ.2': 10, 'ASE_REQ.2': 13, 'ASE_SPD.1': 7, 'ASE_TSS.1': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN': 6, 'FAU_SAR': 9, 'FAU_GEN.1': 10, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_SAR.1': 9, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 4, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 5, 'FAU_SAR.3.1': 1}, 'FCS': {'FCS_COP.1': 2, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC': 1, 'FDP_ACF': 3, 'FDP_ACC.1': 10, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 6, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL': 3, 'FIA_ATD': 3, 'FIA_SOS': 3, 'FIA_UAU': 6, 'FIA_UID': 2, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU.2': 8, 'FIA_UAU.2.1': 1, 'FIA_UAU.6': 5, 'FIA_UAU.6.1': 1, 'FIA_UID.2': 9, 'FIA_UID.2.1': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 1}, 'FMT': {'FMT_MOF': 1, 'FMT_MSA': 5, 'FMT_MTD': 1, 'FMT_REV': 3, 'FMT_SMF': 2, 'FMT_SMR': 2, 'FMT_MOF.1': 7, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 7, 'FMT_MTD.1.1': 2, 'FMT_REV.1': 4, 'FMT_REV.1.1': 1, 'FMT_REV.1.2': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 12, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 2}, 'FTA': {'FTA_SSL': 6, 'FTA_TAB': 3, 'FTA_TSE': 3, 'FTA_SSL.3': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL.4': 5, 'FTA_SSL.4.1': 1, 'FTA_TAB.1': 5, 'FTA_TAB.1.1': 1, 'FTA_TSE.1': 4, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 4, 'O.AUDIT': 4, 'O.AUDIT_REVIEW': 4, 'O.I_AND_A': 3, 'O.LOGON_BANNER': 4, 'O.PASSWORD_CONTROLS': 3, 'O.SECURITY_MANAGEMENT': 4, 'O.SESSION_LIMITATION': 3, 'O.SESSION_TERMINATION': 4, 'O.THROTTLE': 3}, 'T': {'T.BRUTE_FORCE': 3, 'T.DATA_COMPROMISE': 2, 'T.INAPPROPRIATE_USE': 2, 'T.NO_ACCOUNTABILITY': 2, 'T.UNATTENDED_SESSION': 3, 'T.UNAUTHORIZED_ACCESS': 2, 'T.UNAUTHORIZED_ACTIVITY': 3, 'T.INAPPRORIATE_USE': 1}, 'A': {'A.MANAGE': 2, 'A.PROTECT': 2, 'A.SECURE_COMMS': 3, 'A.TIME': 2, 'A.CRYPTO': 3}, 'OE': {'OE.PHYSICAL': 2, 'OE.PERSONNEL': 2, 'OE.SECURE_COMMS': 2, 'OE.TIME': 3, 'OE.CRYPTO': 3}}, 'vendor': {'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to RSA Archer 6.3 ST v0.7.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/RSA%20Archer%206.3%20ST%20v0.7.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is https://rsa.com.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is None.

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ISCB-5-RPT-C095-CR-v1.pdf, code: nok'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2020-5331', 'CVE-2020-5333', 'CVE-2020-5336', 'CVE-2020-5337', 'CVE-2020-5334', 'CVE-2020-5332', 'CVE-2020-5335']} values discarded.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'ISCB-5-RPT-C095-CR-v1.pdf', 'st_filename': 'RSA Archer 6.3 ST v0.7.pdf'}.
    • The report_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 8}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 2}}}}}}, 'tee_name': {}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__insert__': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1}, '__update__': {'ADV_ARC.1': 10, 'ADV_FSP.2': 11, 'ADV_TDS.1': 11}}, 'AGD': {'__insert__': {'AGD_OPE': 1, 'AGD_PRE': 1}, '__update__': {'AGD_OPE.1': 10, 'AGD_PRE.1': 6}}, 'ALC': {'__insert__': {'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_FLR': 1}, '__update__': {'ALC_FLR.2': 16, 'ALC_CMC.2': 8, 'ALC_CMS.2': 6, 'ALC_DEL.1': 5}}, 'ATE': {'__insert__': {'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, '__update__': {'ATE_COV.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, '__delete__': ['ATE_USE']}, 'AVA': {'__insert__': {'AVA_VAN': 1}, '__update__': {'AVA_VAN.2': 7}}, 'ASE': {'__insert__': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}, '__update__': {'ASE_CCL.1': 14, 'ASE_ECD.1': 10, 'ASE_INT.1': 12, 'ASE_OBJ.2': 10, 'ASE_REQ.2': 13, 'ASE_SPD.1': 7, 'ASE_TSS.1': 5}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_GEN': 6, 'FAU_SAR': 9}, '__update__': {'FAU_GEN.1': 10, 'FAU_SAR.1': 9, 'FAU_SAR.2': 4}}, 'FDP': {'__insert__': {'FDP_ACC': 1, 'FDP_ACF': 3}, '__update__': {'FDP_ACC.1': 10, 'FDP_ACF.1': 6}}, 'FIA': {'__insert__': {'FIA_AFL': 3, 'FIA_ATD': 3, 'FIA_SOS': 3, 'FIA_UAU': 6, 'FIA_UID': 2}, '__update__': {'FIA_UID.2': 9, 'FIA_UID.1': 5, 'FIA_UAU.1': 1}}, 'FMT': {'__insert__': {'FMT_MOF': 1, 'FMT_MSA': 5, 'FMT_MTD': 1, 'FMT_REV': 3, 'FMT_SMF': 2, 'FMT_SMR': 2}, '__update__': {'FMT_MSA.1': 6, 'FMT_MSA.3': 6, 'FMT_MTD.1': 7, 'FMT_REV.1': 4, 'FMT_SMR.1': 12}}, 'FTA': {'__insert__': {'FTA_SSL': 6, 'FTA_TAB': 3, 'FTA_TSE': 3}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AUDIT': 4, 'O.I_AND_A': 3, 'O.PASSWORD_CONTROLS': 3, 'O.SESSION_LIMITATION': 3, 'O.THROTTLE': 3}}, 'T': {'__update__': {'T.DATA_COMPROMISE': 2, 'T.NO_ACCOUNTABILITY': 2}, '__delete__': ['T']}, 'A': {'__update__': {'A.TIME': 2}}, 'OE': {'__delete__': ['OE']}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'tee_name': {}} data.
  • 01.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-37317']} values added.
  • 21.07.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-30584', 'CVE-2022-30585']} values added.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:mycc@cybersecurity.my', 'http://www.commoncriteriaportal.org/', 'http://www.cybersecurity.my/mycc']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C095-CR-v1': 29}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 5, 'EAL 2': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 6}, 'ATE': {'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.2': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1.1': 5, 'FAU_GEN.1.2': 5, 'FAU_GEN.2.1': 3, 'FAU_SAR.1.1': 3, 'FAU_SAR.1.2': 3, 'FAU_SAR.3.1': 3, 'FAU_SAR.2.1': 1}, 'FDP': {'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 2, 'FIA_UAU.2.1': 4, 'FIA_UAU.5.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.2.1': 3}, 'FMT': {'FMT_MTD.1.1': 4, 'FMT_SMF.1.1': 5, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 3, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 2, 'FMT_MOF.1.1': 1}, 'FTA': {'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 3, 'FTA_TAB.1.1': 1, 'FTA_TSE.1.1': 1}}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {'Leidos': {'Leidos': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 3, 'EAL 2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_USE': 3, 'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 11, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_SAR.1': 11, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 5, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 5, 'FAU_SAR.3.1': 1}, 'FCS': {'FCS_COP.1': 2, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 11, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 7, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU.2': 8, 'FIA_UAU.2.1': 1, 'FIA_UAU.6': 5, 'FIA_UAU.6.1': 1, 'FIA_UID.2': 10, 'FIA_UID.2.1': 1, 'FIA_UID.1': 6, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MOF.1': 7, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 7, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 8, 'FMT_MTD.1.1': 2, 'FMT_REV.1': 5, 'FMT_REV.1.1': 1, 'FMT_REV.1.2': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 16, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 2}, 'FTA': {'FTA_SSL.3': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL.4': 5, 'FTA_SSL.4.1': 1, 'FTA_TAB.1': 5, 'FTA_TAB.1.1': 1, 'FTA_TSE.1': 4, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 4, 'O.AUDIT': 5, 'O.AUDIT_REVIEW': 4, 'O.I_AND_A': 4, 'O.LOGON_BANNER': 4, 'O.PASSWORD_CONTROLS': 4, 'O.SECURITY_MANAGEMENT': 4, 'O.SESSION_LIMITATION': 4, 'O.SESSION_TERMINATION': 4, 'O.THROTTLE': 4}, 'T': {'T': 2, 'T.BRUTE_FORCE': 3, 'T.DATA_COMPROMISE': 3, 'T.INAPPROPRIATE_USE': 2, 'T.NO_ACCOUNTABILITY': 3, 'T.UNATTENDED_SESSION': 3, 'T.UNAUTHORIZED_ACCESS': 2, 'T.UNAUTHORIZED_ACTIVITY': 3, 'T.INAPPRORIATE_USE': 1}, 'A': {'A.MANAGE': 2, 'A.PROTECT': 2, 'A.SECURE_COMMS': 3, 'A.TIME': 3, 'A.CRYPTO': 3}, 'OE': {'OE': 1, 'OE.PHYSICAL': 2, 'OE.PERSONNEL': 2, 'OE.SECURE_COMMS': 2, 'OE.TIME': 3, 'OE.CRYPTO': 3}}, 'vendor': {'STMicroelectronics': {'STM': 2}, 'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 8}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_id property was set to ISCB-5-RPT-C095-CR-v1.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '52acafb80f2d3cc3a76ac88c2bb719786f1f4eee44c265b57321c8bd2c14bce5', 'st_pdf_hash': 'a0818a3ace4bd09de6e773bae73c707cf98ae59839749222ffe6c76fc8edd9a8', 'report_txt_hash': '39e895b2354c22240d672c832d35c0936165d16b79f5b2fc60e8cefc19b2218c', 'st_txt_hash': '4cffac45b6c7a7f21dd82cc6a30844a34bc31465c94e652038d04cf290affed8'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 8}, 'rules_side_channels': {}} values inserted.
  • 12.06.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2021-33615']} values added.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_cert_id': {}} data.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
    • The cert_id property was set to None.
  • 13.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2021-33616']} values added.
  • 07.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-26948', 'CVE-2021-41594', 'CVE-2022-26949', 'CVE-2022-26951', 'CVE-2021-38362', 'CVE-2022-26947', 'CVE-2022-26950']} values added.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'ISCB-5-RPT-C095-CR-v1': 29}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['6.3']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:rsa:archer:6.3:*:*:*:*:*:*:*']}.
    • The cert_id property was set to ISCB-5-RPT-C095-CR-v1.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name RSA Archer Suite v6.3 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "98e92fd36fe22f33",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C095-CR-v1",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:rsa:archer:6.3:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.3"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2019-3756",
        "CVE-2022-30585",
        "CVE-2022-37317",
        "CVE-2021-41594",
        "CVE-2022-26950",
        "CVE-2022-26949",
        "CVE-2020-5335",
        "CVE-2022-26947",
        "CVE-2020-5334",
        "CVE-2022-26948",
        "CVE-2020-5331",
        "CVE-2020-5336",
        "CVE-2022-30584",
        "CVE-2020-5337",
        "CVE-2020-5332",
        "CVE-2019-3758",
        "CVE-2021-38362",
        "CVE-2022-26951",
        "CVE-2021-33615",
        "CVE-2020-5333",
        "CVE-2021-33616"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2020-006-C113",
      "certification_date": "24-11-2017",
      "developer": "RSA Security LLC",
      "enhanced": {
        "assurance_level": "EAL2+ ALC_FLR.2",
        "category": "Other Devices and Systems",
        "cert_id": "C113",
        "certification_date": "24-11-2017",
        "developer": "13200 Metcalf Avenue,Suite 300 Overland Park,Kansas 66213,The United States of America\nName \u0026 Tel: Jeremy Fisher (913-549-1565)Email: Jeremy.fisher@rsa.comWebsite: https://www.rsa.com/",
        "expiration_date": "24-11-2022",
        "mutual_recognition": "CCRA",
        "product": "RSA Archer Suite v6.7",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C113/ISCB-5-RPT-C113-CR-V1.pdf",
        "scope": "The Target of Evaluation (TOE) is RSA Archer Suite v6.7. It is a software product that supports business-level management of governance, risk management and compliance. Users access the TOE via a web-based graphical user interface (GUI). All users require an account in order to log on to the TOE. The user account specifies the user\u2019s groups and access roles. An access role is a collection of application-level and page-level rights that an administrator can create and assign to any number of users and groups to control user privileges (create, read, update, and delete). The Content API, Web Services API and RESTful APIs programmatically extend the functionality of the TOE to external applications through several classes and methods which expose many of its features, allowing for a high level of integration with other products. All users must be successfully identified and authenticated by the TOE before gaining access to any other TOE services.",
        "status": "Archive",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C113/RSA_Archer_6.7_ST_v1.0_09-29-2020.pdf",
        "type": "Other Devices and Systems"
      },
      "expiration_date": "24-11-2022",
      "level": "EAL2+ ALC_FLR.2",
      "product": "RSA Archer Suite v6.7",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/139"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "RSA Security LLC",
  "manufacturer_web": "https://rsa.com",
  "name": "RSA Archer Suite v6.3",
  "not_valid_after": "2023-05-30",
  "not_valid_before": "2018-05-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ISCB-5-RPT-C095-CR-v1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C095-CR-v1": 29
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 8
        },
        "ATE": {
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3,
          "EAL2": 5
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1.1": 5,
          "FAU_GEN.1.2": 5,
          "FAU_GEN.2.1": 3,
          "FAU_SAR.1.1": 3,
          "FAU_SAR.1.2": 3,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3.1": 3
        },
        "FDP": {
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1
        },
        "FIA": {
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.1.1": 2,
          "FIA_UAU.2.1": 4,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.6.1": 1,
          "FIA_UID.2.1": 3
        },
        "FMT": {
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1.1": 4,
          "FMT_REV.1.1": 2,
          "FMT_REV.1.2": 2,
          "FMT_SMF.1.1": 5,
          "FMT_SMR.1.1": 3,
          "FMT_SMR.1.2": 3
        },
        "FTA": {
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4.1": 3,
          "FTA_TAB.1.1": 1,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ISCB Department",
      "/CreationDate": "D:20180601030646+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/Keywords": "MyCB_TMP_002",
      "/ModDate": "D:20180601030646+00\u002700\u0027",
      "/Subject": "RSA Archer Suite v6.3",
      "/Title": "C095 Certification Report",
      "pdf_file_size_bytes": 744439,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:mycc@cybersecurity.my",
          "http://www.cybersecurity.my/mycc",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 30
    },
    "st_filename": "RSA Archer 6.3 ST v0.7.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CRYPTO": 3,
          "A.MANAGE": 2,
          "A.PROTECT": 2,
          "A.SECURE_COMMS": 3,
          "A.TIME": 2
        },
        "O": {
          "O.ACCESS_CONTROL": 4,
          "O.AUDIT": 4,
          "O.AUDIT_REVIEW": 4,
          "O.I_AND_A": 3,
          "O.LOGON_BANNER": 4,
          "O.PASSWORD_CONTROLS": 3,
          "O.SECURITY_MANAGEMENT": 4,
          "O.SESSION_LIMITATION": 3,
          "O.SESSION_TERMINATION": 4,
          "O.THROTTLE": 3
        },
        "OE": {
          "OE.CRYPTO": 3,
          "OE.PERSONNEL": 2,
          "OE.PHYSICAL": 2,
          "OE.SECURE_COMMS": 2,
          "OE.TIME": 3
        },
        "T": {
          "T.BRUTE_FORCE": 3,
          "T.DATA_COMPROMISE": 2,
          "T.INAPPROPRIATE_USE": 2,
          "T.INAPPRORIATE_USE": 1,
          "T.NO_ACCOUNTABILITY": 2,
          "T.UNATTENDED_SESSION": 3,
          "T.UNAUTHORIZED_ACCESS": 2,
          "T.UNAUTHORIZED_ACTIVITY": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 10,
          "ADV_FSP": 1,
          "ADV_FSP.2": 11,
          "ADV_TDS": 1,
          "ADV_TDS.1": 11
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.2": 8,
          "ALC_CMS": 1,
          "ALC_CMS.2": 6,
          "ALC_DEL": 1,
          "ALC_DEL.1": 5,
          "ALC_FLR": 1,
          "ALC_FLR.2": 16
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 14,
          "ASE_ECD": 1,
          "ASE_ECD.1": 10,
          "ASE_INT": 1,
          "ASE_INT.1": 12,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 10,
          "ASE_REQ": 1,
          "ASE_REQ.2": 13,
          "ASE_SPD": 1,
          "ASE_SPD.1": 7,
          "ASE_TSS": 1,
          "ASE_TSS.1": 5
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 4,
          "ATE_FUN": 1,
          "ATE_FUN.1": 8,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.2": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3,
          "EAL 2 augmented": 2,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 6,
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_SAR": 9,
          "FAU_SAR.1": 9,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 4,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 5,
          "FAU_SAR.3.1": 1
        },
        "FCS": {
          "FCS_COP.1": 2,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 10,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 3,
          "FDP_ACF.1": 6,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 1
        },
        "FIA": {
          "FIA_AFL": 3,
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 3,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 3,
          "FIA_SOS.1": 5,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 6,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.6": 5,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 5,
          "FIA_UID.2": 9,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 5,
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 6,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 2,
          "FMT_REV": 3,
          "FMT_REV.1": 4,
          "FMT_REV.1.1": 1,
          "FMT_REV.1.2": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 2
        },
        "FTA": {
          "FTA_SSL": 6,
          "FTA_SSL.3": 5,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 5,
          "FTA_SSL.4.1": 1,
          "FTA_TAB": 3,
          "FTA_TAB.1": 5,
          "FTA_TAB.1.1": 1,
          "FTA_TSE": 3,
          "FTA_TSE.1": 4,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 10
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Apted, Tony J. [RA]",
      "/CreationDate": "D:20180520140131+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/ModDate": "D:20180520140131+00\u002700\u0027",
      "/Subject": "Security Target",
      "/Title": "RSA Archer GRC",
      "pdf_file_size_bytes": 845765,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 42
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/ISCB-5-RPT-C095-CR-v1.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/RSA%20Archer%206.3%20ST%20v0.7.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "52acafb80f2d3cc3a76ac88c2bb719786f1f4eee44c265b57321c8bd2c14bce5",
      "txt_hash": "39e895b2354c22240d672c832d35c0936165d16b79f5b2fc60e8cefc19b2218c"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a0818a3ace4bd09de6e773bae73c707cf98ae59839749222ffe6c76fc8edd9a8",
      "txt_hash": "4cffac45b6c7a7f21dd82cc6a30844a34bc31465c94e652038d04cf290affed8"
    }
  },
  "status": "archived"
}