Antragsteller | Produktname | Produkttyp | Zertifizierungs-ID |
---|---|---|---|
Siemens VDO Automotive AG | DTCO 1381, Release 1 | Digitaler Tachograph, Fahrtenschreiber | BSI-DSZ-ITSEC-0289 |
I-Motion GmbH | I-MOTION VPNConnect Version 1.2.650 | VPN-Produkt | BSI-DSZ-CC-0288 |
Giesecke & Devrient | STARCOS SPK 2.4 mit Tachograph Card Applikation (Tachosmart Card) | Smartcard | BSI-DSZ-ITSEC-0287 |
IBM Corporation | IBM DB2 UDB for z/OS Version 8 | Database Server | BSI-DSZ-CC-0286 |
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0 extended by advice of the Certification Body for components beyond EAL4 and smart card specific guidance for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999) and including final interpretations for compliance with Common Criteria Version 2.2 and Common Methodology Part 2, Version 2.2.
Evaluation Results |
|
---|---|
Functionality: | Product specific Security Target
Common Criteria Part 2 extended |
Assurance Package: | Common Criteria part 3 conformant
EAL4 augmented by: AVA_MSU.3 – Vulnerability assessment – Analysis and testing for insecure states AVA_VLA.4 – Vulnerability assessment – Highly resistant |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the German Federal Office for Information Security (BSI) and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 24. November 2004
The President of the Federal Office for Information Security
Dr. Helmbrecht
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0 extended by advice of the Certification Body for components beyond EAL4 and smart card specific guidance for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999) and including final interpretations for compliance with Common Criteria Version 2.2 and Common Methodology Part 2, Version 2.2.
Evaluation Results |
|
---|---|
Functionality: | Product specific Security Target
Common Criteria Part 2 extended |
Assurance Package: | Common Criteria part 3 conformant
EAL4 augmented by: AVA_MSU.3 – Vulnerability assessment – Analysis and testing for insecure states AVA_VLA.4 – Vulnerability assessment – Highly resistant |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the German Federal Office for Information Security (BSI) and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 24. November 2004
The President of the Federal Office for Information Security
Dr. Helmbrecht
der
Das in diesem Zertifikat genannte IT-Produkt wurde von einer akkreditierten und lizenzierten Prüfstelle nach den Gemeinsamen Kriterien für die Prüfung und Bewertung der Sicherheit von Informationstechnik (CC), Version 2.1 (ISO/IEC 15408:1999), unter Nutzung der Gemeinsamen Evaluationsmethodologie für die Prüfung und Bewertung der Sicherheit von Informationstechnik (CEM), Teil 1 Version 0.6, Teil 2 Version 1.0, ergänzt um Final Interpretations in Übereinstimmung mit Common Criteria Version 2.2 und Common Methodology Part 2, Version 2.2 sowie Anweisungen der Zertifizierungsstelle für Komponenten oberhalb von EAL4 evaluiert.
Prüfergebnis |
|
---|---|
Funktionalität: | produkt-spezifische Sicherheitsvorgaben
Common Criteria Teil 2 erweitert |
Vertrauenswürdigkeit: | Common Criteria Teil 3 konform EAL3 / mit Zusatz von
ADV_IMP.1 (Teilmenge der Implementierung der TSF) ADV_LLD.1 (Beschreibender Entwurf auf niedriger Ebene) ALC_TAT.1 (Klar festgelegte Entwicklungswerkzeuge) AVA_MSU.3 (Analysieren und Testen auf unsichere Zustände) AVA_VLA.4 (Hohe Widerstandsfähigkeit) |
Dieses Zertifikat gilt nur für die angegebene Version des Produktes in der evaluierten Konfiguration und nur in Verbindung mit dem vollständigen Zertifizierungsreport.
Die Evaluation wurde in Übereinstimmung mit den Bestimmungen des Zertifizierungsschemas des Bundesamtes für Sicherheit in der Informationstechnik durchgeführt. Die im Evaluationsbericht enthaltenen Schlussfolgerungen der Prüfstelle sind in Einklang mit den erbrachten Nachweisen.
Die auf der Rückseite aufgeführten Anmerkungen sind Bestandteil dieses Zertifikates.
Bonn, den 19 November 2004
Der Präsident des Bundesamtes für Sicherheit in der Informationstechnik
Dr. Helmbrecht
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0 extended by advice of the Certification Body for components beyond EAL4 and smart card specific guidance for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999) and including final interpretations for compliance with Common Criteria Version 2.2 and Common Methodology Part 2, Version 2.2.
Evaluation Results |
|
---|---|
PP Conformance: | Protection Profile BSI-PP-0002-2001 |
Functionality: | BSI-PP-0002-2001 conformant plus product specific extensions Common Criteria Part 2 extended |
Assurance Package: | Common Criteria part 3 conformant
EAL5 augmented by: ALC_DVS.2 (Life cycle support – Sufficiency of security measures), AVA_MSU.3 (Vulnerability assessment – Analysis and testing for insecure states), AVA_VLA.4 (Vulnerability assessment – Highly resistant) |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the German Federal Office for Information Security (BSI) and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 11. November 2004
The President of the Federal Office for Information Security
Dr. Helmbrecht
from
The IT product identified in this certificate has been evaluated at an accredited and licensed/approved evaluation facility using the Common Methodology for IT Security Evaluation, Part 1 Version 0.6, Part 2 Version 1.0 for conformance to the Common Criteria for IT Security Evaluation, Version 2.1 (ISO/IEC 15408:1999) and including final interpretations for compliance with Common Criteria Version 2.2 and Common Methodology Part 2, Version 2.2.
Evaluation Results |
|
---|---|
Functionality: | Product specific Security Target
Common Criteria Part 2 extended |
Assurance Package: | Common Criteria part 3 conformant
EAL2 |
This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report.
The evaluation has been conducted in accordance with the provisions of the certification scheme of the German Federal Office for Information Security (BSI) and the conclusions of the evaluation facility in the evaluation technical report are consistent with the evidence adduced.
The notes mentioned on the reverse side are part of this certificate.
Bonn, 27. October 2004
The President of the Federal Office for Information Security
Dr. Helmbrecht
© SecuMedia-Verlags-GmbH, 55205 Ingelheim (DE),
<kes> 2005#1, Seite 47