1
min reading time
The new PP was developed and published in November 2019 by Ad-Hoc Group Privacy & Security of the CEN/CENELEC/ETSI Coordination Group on Smart Meters.
The latest PP document is available on the Common Criteria Portal.
As the number of IoT and specifically smart metering products have been increasing recently all over the world, it will be a great help for factories, producers and also for clients who intend to use these kinds of products in the future. The PP includes a detailed description of all the minimum security requirements which should be met by any smart metering product available on the market.
Why do we like it so much?
CCLAB has great experience in CC evaluations and smart metering devices.
With the clear Protection Profile CCLAB will keep on providing the most effective and shortest possible evaluation projects on the highest professional level for its clients.
Get your FREE A-Z supporting material for smart meter security standards. Learn more about the Swiss METAS data security evaluation projects of smart metering devices.
This downloadable infographics introduces you to the Swiss Smart Metering data security pre-assessment process of METAS certification.
This downloadable infographics introduces you to Swiss Smart Metering data security evaluation process of METAS certification.
The European Union's digital infrastructure is continuously evolving to facilitate secure, cross-border electronic transactions. In this context, two crucial frameworks—the eIDAS regulation and the Common Criteria standard— play pivotal roles. eIDAS (Electronic Identification, Authentication, and Trust Services) aims to unify and enhance electronic identification systems across the EU. Meanwhile, the Common Criteria standard offers a comprehensive framework for evaluating the security of IT products and systems.
7
min reading time
The EUCC scheme, spearheaded by the European Union Agency for Cybersecurity (ENISA), was released in early 2024. It builds on the SOG-IS Common Criteria evaluation framework already used by 17 EU Member States.
7
min reading time
ICT (Information and Communication Technology) products, encompassing a wide range of digital devices and software, are inherently vulnerable due to their complexity and the ever-present potential for undiscovered security flaws. The interconnected nature of these products further amplifies the risk, as a single vulnerability can lead to widespread security breaches across networks and systems. To mitigate these risks, the strategic integration of cybersecurity certification requirements in ICT products has become paramount.
8
min reading time