genuscreen 8.0

CSV information ?

Status active
Valid from 06.04.2023
Valid until 05.04.2028
Scheme 🇩🇪 DE
Manufacturer genua GmbH
Category Boundary Protection Devices and Systems
Security level ASE_TSS.2, AVA_VAN.4, EAL4+, ALC_FLR.2, ALC_PAM.1
Maintenance updates genuscreen 8.0 as part of genuscreen8.0p15/genucenter 8.0p7/SIP Relay module 8.0p15 (17.11.2023) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1194-2023

Certificate ?

Extracted keywords

Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, AVA_VAN.4, ASE_TSS.2
Certificates
BSI-DSZ-CC-1194-2023

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title: Certificate BSI-DSZ-CC-1194-2023 for genuscreen 8.0 from genua GmbH
Subject: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH
Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH
Author: Bundesamt für Sicherheit in der Informationstechnik
Pages: 1

Certification report ?

Extracted keywords

Symmetric Algorithms
HMAC
Asymmetric Algorithms
DH
Hash functions
SHA256
Schemes
Key Exchange
Protocols
SSH, TLSv1.2, TLSv1.3, IKEv2, IKE, IPsec, VPN
Randomness
RNG
Block cipher modes
CBC

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 5+, EAL 6, EAL 4 augmented
Claims
A.PHYSEC, A.NOEVIL, A.REMOTE_AUTH, A.REST, A.INIT, A.SINGEN, A.ADMIN, A.HANET, A.LOCAL, A.TIMESTMP
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, AVA_VAN.4, ASE_TSS.2
Certificates
BSI-DSZ-CC-1194-2023, BSI-DSZ-CC-1142-2020
Evaluation facilities
secuvera
Certification process
out of scope, components were installed on physical hardware, the installation of the TOE on virtual machines is out of scope of the evaluated configuration. For the operational configuration the genuscreens and the, L2TP VPN, MOBIKE VPN, Dynamic Routing, genucenter HA, Remote Maintenance, getimagesfromcpt) are out of scope of the evaluated configuration. 18 / 26 BSI-DSZ-CC-1194-2023 Certification Report All information, being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, for genuscreen 8.0 from genua GmbH, Version 3, Date: 30.03.2023, secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genuscreen Installations- und Konfigurationshandbuch

Certification process
out of scope, components were installed on physical hardware, the installation of the TOE on virtual machines is out of scope of the evaluated configuration. For the operational configuration the genuscreens and the, L2TP VPN, MOBIKE VPN, Dynamic Routing, genucenter HA, Remote Maintenance, getimagesfromcpt) are out of scope of the evaluated configuration. 18 / 26 BSI-DSZ-CC-1194-2023 Certification Report All information, being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, for genuscreen 8.0 from genua GmbH, Version 3, Date: 30.03.2023, secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genuscreen Installations- und Konfigurationshandbuch

Standards
AIS 20, AIS 32, AIS 34, AIS 38, AIS 46, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-1194-2023 for genuscreen 8.0 from genua GmbH
Subject: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH
Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH
Author: Bundesamt für Sicherheit in der Informationstechnik
Pages: 26

Frontpage

Certificate ID: BSI-DSZ-CC-1194-2023
Certified item: genuscreen 8.0
Certification lab: BSI
Developer: genua GmbH

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-512, SHA-384, SHA-256
Schemes
MAC, Key Exchange
Protocols
SSH, TLS, IKEv1, IKEv2, IKE, IPsec, VPN
Randomness
RNG
Libraries
OpenSSL, LibreSSL
Block cipher modes
CBC, CTR, GCM

Security level
EAL4, EAL4 augmented
Claims
O.AUTH, O.MEDIAT, O.CONFID, O.INTEG, O.NOREPLAY, O.AUDREC, O.AVAIL, O.PATCH, T.NOAUTH, T.SNIFF, T.SELPRO, T.MEDIAT, T.MSNIFF, T.MODIFY, T.MMODIFY, A.PHYSEC, A.INIT, A.NOEVIL, A.SINGEN, A.TIMESTMP, A.ADMIN, A.HANET, A.REMOTE_AUTH, A.LOCAL, A.REST, OE.TIMESTMP, OE.PHYSEC, OE.INIT, OE.NOEVIL, OE.SINGEN, OE.ADMIN, OE.HANET, OE.REMOTE_AUTH, OE.CERTKEYS, OE.LOCAL, OE.REST
Security Assurance Requirements (SAR)
ADV_INT, ADV_SPM, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_TDS.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_PAM, ALC_PAM.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, ATE_COV.1, AVA_VAN.4, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_UPD, FAU_SAR, FAU_SAR.1, FAU_SAR.3, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP, FCS_CKM, FCS_CKM.4, FCS_CKM.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_IFC.2, FDP_ITT, FDP_ITT.1, FDP_ITC.1, FIA_ATD, FIA_ATD.1, FIA_SOS, FIA_SOS.1, FIA_UAU, FIA_UAU.2, FIA_UAU.6, FIA_UID, FIA_UID.2, FIA_UID.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_SMF, FMT_SMF.1, FMT_MSA.2, FMT_MOF, FMT_MOF.1, FMT_SMR, FMT_SMR.1, FPT_UPD, FPT_STM.1, FPT_ITT, FPT_ITT.1, FPT_TEE, FPT_TEE.1, FPT_TRC, FPT_TRC.1.1, FPT_TRC.1.2
Certification process
out of scope, hardware has not been evaluated. Also, operating the genucenter software on a virtual machine is out of scope for this certification. If the virtual genucenter is used, the end user has to ensure that all, can, however, be used in certified configurations. If cryptographic functions are used, they are out of scope of the TOE. 1.4.10 Secure Initialisation of genuscreen (Firewall Component) To guarantee that all, a smartcard to perform cryptographic operations for IPsec usage. However, usage of the smartcard is out of scope for this TOE. The smartcard can however be used as an entropy source both for genuscreen and, 10 No Remote Maintenance The remote maintenance feature using a rendezvous genuscreen appliance is out of scope. 1.4.11.11 No getimagesfromcpt The command line tool getimagesfromcpt must not be used to install

Certification process
out of scope, hardware has not been evaluated. Also, operating the genucenter software on a virtual machine is out of scope for this certification. If the virtual genucenter is used, the end user has to ensure that all, can, however, be used in certified configurations. If cryptographic functions are used, they are out of scope of the TOE. 1.4.10 Secure Initialisation of genuscreen (Firewall Component) To guarantee that all, a smartcard to perform cryptographic operations for IPsec usage. However, usage of the smartcard is out of scope for this TOE. The smartcard can however be used as an entropy source both for genuscreen and, 10 No Remote Maintenance The remote maintenance feature using a rendezvous genuscreen appliance is out of scope. 1.4.11.11 No getimagesfromcpt The command line tool getimagesfromcpt must not be used to install

Standards
PKCS#1, AIS20, AIS31, AIS 20, AIS 31, RFC2409, RFC7296, RFC2460, RFC3414, RFC6353, RFC3602, RFC2104, RFC4868, RFC5280, RFC6960, RFC5114, RFC5903, RFC4754, RFC4253, RFC5639, RFC4418, RFC6239, RFC8017, RFC4301, RFC4307, RFC4344, RFC 7617, RFC 4344, RFC 3414, RFC 5590, RFC 5280, RFC 6818, RFC 2460, RFC 3602, RFC 4754, RFC 5903, RFC 6353, RFC 2409, RFC 4306, RFC 4109, RFC 6239, RFC 7296, RFC 7427, RFC 4868, RFC 4301, RFC 6040, RFC 2104, RFC 6151, RFC 4418, RFC 5114, RFC 5639, RFC 6960, RFC 4307, RFC 5656, RFC 4253, RFC 6668, ISO/IEC 18045, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: genuscreen 8.0 Security Target
Subject: Common Criteria certification
Keywords: firewall, and, VPN, gateway
Author: genua GmbH
Pages: 83

References

Outgoing

Heuristics ?

Certificate ID: BSI-DSZ-CC-1194-2023

Extracted SARs

ALC_DVS.1, AGD_OPE.1, ADV_IMP.1, ASE_CCL.1, ADV_ARC.1, ADV_FSP.4, ASE_SPD.1, ASE_ECD.1, ADV_TDS.3, ASE_TSS.2, ATE_FUN.1, ALC_CMS.4, ATE_DPT.1, ALC_PAM.1, ALC_LCD.1, AGD_PRE.1, ALC_DEL.1, ALC_TAT.1, AVA_VAN.4, ALC_FLR.2, ASE_OBJ.2, ASE_INT.1, ATE_COV.2, ADV_TAT.1, ALC_CMC.4, ATE_IND.2, ASE_REQ.2

Scheme data ?

Cert Id BSI-DSZ-CC-1194-2023
Product genuscreen 8.0
Vendor genua GmbH
Certification Date 06.04.2023
Category Network and Network related Devices and Systems
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1194.html
Enhanced
Product genuscreen 8.0
Applicant genua GmbH Domagkstrasse 7 85551 Kirchheim
Evaluation Facility secuvera GmbH
Assurance Level EAL4+,AVA_VAN.4,ASE_TSS.2,ALC_PAM.1
Certification Date 06.04.2023
Expiration Date 05.04.2028
Entries [frozendict({'id': 'BSI-DSZ-CC-1194-2023-MA-01 (Ausstellungsdatum / Certification Date 17.11.2023)\nAssurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management\nAssurance Continuity / Maintanance Report', 'description': 'and firewall functionality available and easy to manage. It consists only of software and documentation. It protects networks at the border to the Internet by filtering incoming and outgoing data traffic. It also protects the data flowing between several protected networks against unauthorised inspection and modification.'}), frozendict({'id': 'BSI-DSZ-CC-1194-2023', 'description': 'Certificate'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1194a_pdf.pdf?__blob=publicationFile&v=1
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1194b_pdf.pdf?__blob=publicationFile&v=1
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1194c_pdf.pdf?__blob=publicationFile&v=1
Description The TOE makes VPN and firewall functionality available and easy to manage. It protects networks at the border to the Internet by filtering incoming and outgoing data traffic. It protects the data flowing between several protected networks against unauthorised inspection and modification. It consists of software on a number (at least 2) of machines (genuscreen appliances) that work as network filters, hereafter called firewall components, and another machine to manage this network of firewall components. This machine, the management system (genucenter management system), is a central component.

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f80cd7ef2b4c033cf9db3159e3f636efc4e9274a11394c97613892b4e94ac5ad', 'txt_hash': 'f1854f399bd56cdf54c64ba88c60417373b697de0f2b7312deaaeac3fdead031'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c1ace210b642f591392f379ac36eac174843626e0a4b2f3403abdfb7fe5d9ebb', 'txt_hash': '33185d0a0757dad9164ec14899591cf991c3125e18c2873154bf62e2744ad093'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9ae009607185607374785147b85da910e05785f2c093aa4657c47561e621a564', 'txt_hash': '350b782e955f87787b597c823351a6e9249de12ab4abe95a04acf0eb276f445d'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 325879, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': 'Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH', '/Subject': 'Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH', '/Title': 'Certificate BSI-DSZ-CC-1194-2023 for genuscreen 8.0 from genua GmbH', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1194-2023': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1, 'ALC_PAM.1': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '1194c_pdf.pdf'}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1194-2023', 'cert_item': 'genuscreen 8.0', 'developer': 'genua GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 extended EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 and ALC_PAM.1'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1194-2023': 15, 'BSI-DSZ-CC-1142-2020': 3}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1194-2023': 30, 'BSI-DSZ-CC-1142-2020': 6}}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1194-2023': 15, 'BSI-DSZ-CC-1142-2020': 3}}}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2023-11-17', 'maintenance_title': 'genuscreen 8.0 as part of genuscreen8.0p15/genucenter 8.0p7/SIP Relay module 8.0p15', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/1194MA01a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/1194MA01b_pdf.pdf'}]}.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'enhanced': {'__insert__': {'entries': [{'id': 'BSI-DSZ-CC-1194-2023-MA-01 (Ausstellungsdatum / Certification Date 17.11.2023)\nAssurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management\nAssurance Continuity / Maintanance Report', 'description': 'and firewall functionality available and easy to manage. It consists only of software and documentation. It protects networks at the border to the Internet by filtering incoming and outgoing data traffic. It also protects the data flowing between several protected networks against unauthorised inspection and modification.'}, {'id': 'BSI-DSZ-CC-1194-2023', 'description': 'Certificate'}]}}} data.
  • 26.04.2023 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name genuscreen 8.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/1194c_pdf.pdf",
  "dgst": "c607afa4266ecff3",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1194-2023",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_PAM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "8.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1142-2020"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1142-2020"
        ]
      }
    },
    "scheme_data": {
      "category": "Network and Network related Devices and Systems",
      "cert_id": "BSI-DSZ-CC-1194-2023",
      "certification_date": "06.04.2023",
      "enhanced": {
        "applicant": "genua GmbH \n\nDomagkstrasse 7\n85551 Kirchheim",
        "assurance_level": "EAL4+,AVA_VAN.4,ASE_TSS.2,ALC_PAM.1",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1194c_pdf.pdf?__blob=publicationFile\u0026v=1",
        "certification_date": "06.04.2023",
        "description": "The TOE makes VPN and firewall functionality available and easy to manage. It protects networks at the border to the Internet by filtering incoming and outgoing data traffic. It protects the data flowing between several protected networks against unauthorised inspection and modification. It consists of software on a number (at least 2) of machines (genuscreen appliances) that work as network filters, hereafter called firewall components, and another machine to manage this network of firewall components. This machine, the management system (genucenter management system), is a central component.",
        "entries": [
          {
            "description": "and firewall functionality available and easy to manage. It consists only of software and documentation. It protects networks at the border to the Internet by filtering incoming and outgoing data traffic. It also protects the data flowing between several protected networks against unauthorised inspection and modification.",
            "id": "BSI-DSZ-CC-1194-2023-MA-01 (Ausstellungsdatum / Certification Date 17.11.2023)\nAssurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management\nAssurance Continuity / Maintanance Report"
          },
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-1194-2023"
          }
        ],
        "evaluation_facility": "secuvera GmbH",
        "expiration_date": "05.04.2028",
        "product": "genuscreen 8.0",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1194a_pdf.pdf?__blob=publicationFile\u0026v=1",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1194b_pdf.pdf?__blob=publicationFile\u0026v=1"
      },
      "product": "genuscreen 8.0",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1194.html",
      "vendor": "genua GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2023-11-17",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/1194MA01a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/1194MA01b_pdf.pdf",
        "maintenance_title": "genuscreen 8.0 as part of genuscreen8.0p15/genucenter 8.0p7/SIP Relay module 8.0p15"
      }
    ]
  },
  "manufacturer": "genua GmbH",
  "manufacturer_web": "https://www.genua.de",
  "name": "genuscreen 8.0",
  "not_valid_after": "2028-04-05",
  "not_valid_before": "2023-04-06",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1194c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1194-2023": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.2": 1,
          "ALC_PAM.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL 4 augmented": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH",
      "/Subject": "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH",
      "/Title": "Certificate BSI-DSZ-CC-1194-2023 for genuscreen 8.0 from genua GmbH",
      "pdf_file_size_bytes": 325879,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1194a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 extended EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 and ALC_PAM.1",
        "cc_version": "Product specific Security Target Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1194-2023",
        "cert_item": "genuscreen 8.0",
        "cert_lab": "BSI",
        "developer": "genua GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "None"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1142-2020": 3,
          "BSI-DSZ-CC-1194-2023": 15
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.HANET": 2,
          "A.INIT": 2,
          "A.LOCAL": 2,
          "A.NOEVIL": 2,
          "A.PHYSEC": 3,
          "A.REMOTE_AUTH": 2,
          "A.REST": 2,
          "A.SINGEN": 2,
          "A.TIMESTMP": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 3,
          "ALC_FLR.2": 5,
          "ALC_PAM.1": 5
        },
        "ASE": {
          "ASE_TSS.2": 5
        },
        "AVA": {
          "AVA_VAN.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 8,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "for genuscreen 8.0 from genua GmbH, Version 3, Date: 30.03.2023, secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genuscreen Installations- und Konfigurationshandbuch": 1
        },
        "OutOfScope": {
          "L2TP VPN, MOBIKE VPN, Dynamic Routing, genucenter HA, Remote Maintenance, getimagesfromcpt) are out of scope of the evaluated configuration. 18 / 26 BSI-DSZ-CC-1194-2023 Certification Report All information": 1,
          "components were installed on physical hardware, the installation of the TOE on virtual machines is out of scope of the evaluated configuration. For the operational configuration the genuscreens and the": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1,
          "IKEv2": 1
        },
        "IPsec": {
          "IPsec": 8
        },
        "SSH": {
          "SSH": 4
        },
        "TLS": {
          "TLS": {
            "TLSv1.2": 1,
            "TLSv1.3": 1
          }
        },
        "VPN": {
          "VPN": 8
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "secuvera": {
          "secuvera": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 32": 1,
          "AIS 34": 1,
          "AIS 38": 1,
          "AIS 46": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH",
      "/Subject": "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH",
      "/Title": "Certification Report BSI-DSZ-CC-1194-2023 for genuscreen 8.0 from genua GmbH",
      "pdf_file_size_bytes": 525558,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    },
    "st_filename": "1194b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 12
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 3,
          "A.HANET": 3,
          "A.INIT": 3,
          "A.LOCAL": 3,
          "A.NOEVIL": 3,
          "A.PHYSEC": 3,
          "A.REMOTE_AUTH": 3,
          "A.REST": 3,
          "A.SINGEN": 4,
          "A.TIMESTMP": 3
        },
        "O": {
          "O.AUDREC": 5,
          "O.AUTH": 10,
          "O.AVAIL": 7,
          "O.CONFID": 13,
          "O.INTEG": 11,
          "O.MEDIAT": 4,
          "O.NOREPLAY": 13,
          "O.PATCH": 3
        },
        "OE": {
          "OE.ADMIN": 2,
          "OE.CERTKEYS": 3,
          "OE.HANET": 5,
          "OE.INIT": 7,
          "OE.LOCAL": 1,
          "OE.NOEVIL": 3,
          "OE.PHYSEC": 4,
          "OE.REMOTE_AUTH": 2,
          "OE.REST": 3,
          "OE.SINGEN": 4,
          "OE.TIMESTMP": 6
        },
        "T": {
          "T.MEDIAT": 3,
          "T.MMODIFY": 3,
          "T.MODIFY": 3,
          "T.MSNIFF": 3,
          "T.NOAUTH": 3,
          "T.SELPRO": 3,
          "T.SNIFF": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 4,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_IMP": 1,
          "ADV_IMP.1": 3,
          "ADV_INT": 2,
          "ADV_SPM": 2,
          "ADV_TAT.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 3,
          "AGD_PRE": 1,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL": 3,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_FLR": 1,
          "ALC_FLR.2": 4,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_PAM": 30,
          "ALC_PAM.1": 52,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 3,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.2": 4
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 2,
          "ATE_FUN": 1,
          "ATE_FUN.1": 4,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 17,
          "FAU_GEN.1": 5,
          "FAU_GEN.2": 1,
          "FAU_SAR": 10,
          "FAU_SAR.1": 3,
          "FAU_SAR.3": 1,
          "FAU_UPD": 1
        },
        "FCS": {
          "FCS_CKM": 87,
          "FCS_CKM.1": 20,
          "FCS_CKM.4": 23,
          "FCS_COP": 70,
          "FCS_COP.1": 22,
          "FCS_RNG": 1,
          "FCS_RNG.1": 20,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_IFC": 43,
          "FDP_IFC.1": 31,
          "FDP_IFC.2": 2,
          "FDP_IFF": 34,
          "FDP_IFF.1": 37,
          "FDP_ITC.1": 2,
          "FDP_ITT": 21,
          "FDP_ITT.1": 3
        },
        "FIA": {
          "FIA_ATD": 5,
          "FIA_ATD.1": 1,
          "FIA_SOS": 5,
          "FIA_SOS.1": 1,
          "FIA_UAU": 10,
          "FIA_UAU.2": 1,
          "FIA_UAU.6": 1,
          "FIA_UID": 5,
          "FIA_UID.1": 3,
          "FIA_UID.2": 2
        },
        "FMT": {
          "FMT_MOF": 5,
          "FMT_MOF.1": 1,
          "FMT_MSA": 122,
          "FMT_MSA.1": 24,
          "FMT_MSA.2": 3,
          "FMT_MSA.3": 18,
          "FMT_SMF": 39,
          "FMT_SMF.1": 22,
          "FMT_SMR": 6,
          "FMT_SMR.1": 25
        },
        "FPT": {
          "FPT_ITT": 8,
          "FPT_ITT.1": 2,
          "FPT_STM.1": 4,
          "FPT_TEE": 7,
          "FPT_TEE.1": 2,
          "FPT_TRC": 6,
          "FPT_TRC.1.1": 1,
          "FPT_TRC.1.2": 1,
          "FPT_UPD": 31
        }
      },
      "certification_process": {
        "OutOfScope": {
          "10 No Remote Maintenance The remote maintenance feature using a rendezvous genuscreen appliance is out of scope. 1.4.11.11 No getimagesfromcpt The command line tool getimagesfromcpt must not be used to install": 1,
          "a smartcard to perform cryptographic operations for IPsec usage. However, usage of the smartcard is out of scope for this TOE. The smartcard can however be used as an entropy source both for genuscreen and": 1,
          "can, however, be used in certified configurations. If cryptographic functions are used, they are out of scope of the TOE. 1.4.10 Secure Initialisation of genuscreen (Firewall Component) To guarantee that all": 1,
          "hardware has not been evaluated. Also, operating the genucenter software on a virtual machine is out of scope for this certification. If the virtual genucenter is used, the end user has to ensure that all": 1,
          "out of scope": 4
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 10
        },
        "CTR": {
          "CTR": 3
        },
        "GCM": {
          "GCM": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "LibreSSL": {
          "LibreSSL": 1
        },
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 83,
          "IKEv1": 10,
          "IKEv2": 20
        },
        "IPsec": {
          "IPsec": 41
        },
        "SSH": {
          "SSH": 113
        },
        "TLS": {
          "TLS": {
            "TLS": 2
          }
        },
        "VPN": {
          "VPN": 14
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 6
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2,
            "SHA-384": 3,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 5
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 1,
          "AIS20": 2,
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC 2409": 1,
          "RFC 2460": 1,
          "RFC 3414": 1,
          "RFC 3602": 1,
          "RFC 4109": 1,
          "RFC 4253": 1,
          "RFC 4301": 1,
          "RFC 4306": 1,
          "RFC 4307": 1,
          "RFC 4344": 1,
          "RFC 4418": 1,
          "RFC 4754": 1,
          "RFC 4868": 1,
          "RFC 5114": 1,
          "RFC 5280": 1,
          "RFC 5590": 1,
          "RFC 5639": 1,
          "RFC 5656": 1,
          "RFC 5903": 1,
          "RFC 6040": 1,
          "RFC 6151": 1,
          "RFC 6239": 1,
          "RFC 6353": 1,
          "RFC 6668": 1,
          "RFC 6818": 1,
          "RFC 6960": 1,
          "RFC 7296": 1,
          "RFC 7427": 1,
          "RFC 7617": 1,
          "RFC2104": 4,
          "RFC2409": 2,
          "RFC2460": 1,
          "RFC3414": 1,
          "RFC3602": 4,
          "RFC4253": 2,
          "RFC4301": 1,
          "RFC4307": 1,
          "RFC4344": 1,
          "RFC4418": 4,
          "RFC4754": 2,
          "RFC4868": 4,
          "RFC5114": 2,
          "RFC5280": 1,
          "RFC5639": 3,
          "RFC5903": 3,
          "RFC6239": 3,
          "RFC6353": 1,
          "RFC6960": 1,
          "RFC7296": 2,
          "RFC8017": 2
        },
        "X509": {
          "X.509": 12
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 4,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "genua GmbH",
      "/Keywords": "firewall, and, VPN, gateway",
      "/Subject": "Common Criteria certification",
      "/Title": "genuscreen 8.0 Security Target",
      "pdf_file_size_bytes": 402456,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ietf.org/rfc/rfc5656.txt",
          "http://www.ietf.org/rfc/rfc4253.txt",
          "http://www.ietf.org/rfc/rfc3602.txt",
          "http://www.ietf.org/rfc/rfc2409.txt",
          "http://www.ietf.org/rfc/rfc6353.txt",
          "http://dx.doi.org/10.6028/NIST.SP.800-38D",
          "http://www.ietf.org/rfc/rfc4307.txt",
          "http://www.ietf.org/rfc/rfc4344.txt",
          "http://www.ietf.org/rfc/rfc2104.txt",
          "http://dx.doi.org/10.6028/NIST.SP.800-38A",
          "http://www.ietf.org/rfc/rfc2460.txt",
          "http://www.ietf.org/rfc/rfc4868.txt",
          "http://dx.doi.org/10.17487/RFC8017",
          "http://www.ietf.org/rfc/rfc4754.txt",
          "http://www.ietf.org/rfc/rfc6239.txt",
          "http://www.ietf.org/rfc/rfc4418.txt",
          "https://doi.org/10.17487/RFC8017",
          "http://dx.doi.org/10.6028/NIST.FIPS.180-4",
          "http://www.ietf.org/rfc/rfc3414.txt",
          "http://www.ietf.org/rfc/rfc4301.txt",
          "https://tools.ietf.org/html/draft-miller-secsh-umac-01",
          "http://www.ietf.org/rfc/rfc5639.txt",
          "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_pdf.html",
          "http://www.ietf.org/rfc/rfc6960.txt",
          "http://www.ecc-brainpool.org/download/Domain-parameters.pdf",
          "http://www.ietf.org/rfc/rfc5114.txt",
          "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_for_random_number_generators_e.pdf?__blob=publicationFile",
          "http://www.ietf.org/rfc/rfc5280.txt",
          "http://www.ietf.org/rfc/rfc7296.txt",
          "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_pdf.html",
          "http://dx.doi.org/10.6028/NIST.FIPS.186-4",
          "http://www.ietf.org/rfc/rfc5903.txt",
          "http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 83
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1194a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.4",
      "ASE_TSS.2",
      "ALC_FLR.2",
      "ALC_PAM.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1194b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9ae009607185607374785147b85da910e05785f2c093aa4657c47561e621a564",
      "txt_hash": "350b782e955f87787b597c823351a6e9249de12ab4abe95a04acf0eb276f445d"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f80cd7ef2b4c033cf9db3159e3f636efc4e9274a11394c97613892b4e94ac5ad",
      "txt_hash": "f1854f399bd56cdf54c64ba88c60417373b697de0f2b7312deaaeac3fdead031"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c1ace210b642f591392f379ac36eac174843626e0a4b2f3403abdfb7fe5d9ebb",
      "txt_hash": "33185d0a0757dad9164ec14899591cf991c3125e18c2873154bf62e2744ad093"
    }
  },
  "status": "active"
}