
1
min reading time
We are proud to announce that Securosys SA successfully gained EAL 4+ CC certificate for Primus HSM FW 2.8.21 Series E, Series X .
Primus X-Series HSMs are secure and tamper-proof network security appliances, they are ideally suited to fulfill the highest requirements in high availability systems. Multiple HSMs can be grouped together as clusters across different datacenters, countries, or even continents to provide load balancing and fail-over.
The complete CC evaluation project started last year with an intensive consulting phase. Once all the documents and the product itself were ready, the evaluation phase went smoothly with a great collaboration with Securosys developers.
“It was a pleasure to work with CClab, they were very professional in supporting us to achieve a successful certification. We are also planning the next evaluation project with them; preparations have already started.” - Marcel Dasen, VP Engineering Securosys
Having some challenges due to the pandemic, we managed to conduct a successful evaluation project with remote access.
“Although we couldn’t do an in-person site visit, the development team managed to go to their office and show us remotely how the security measures were applied. Together we identified some issues that were pro-actively fixed, making both the developer area and TOE more secure. Working together and having remote meetings on demand also helped enormously to make the certification process go as smooth as possible and we are looking forward to more projects together. Let’s keep up the good work and make the world more secure together!” - Imre Fodor, Head of Laboratory
Congratulations for the certification!
You can learn more about the product here.


This downloadable infographics introduces the Common Criteria Evaluation process to you. Explore now for free.


Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.


Want to understand the MDR, IVDR regulation? Download our e-book on the latest requirements of medical cybersecurity

Legacy systems power critical operations across industries worldwide, yet they present unique challenges when organizations pursue Common Criteria certification. The clock is ticking for manufacturers and enterprises who must navigate complex compliance requirements while maintaining operational continuity. Organizations pursuing Common Criteria certification must address unique challenges when dealing with legacy infrastructure, but with the right approach, success is achievable. The urgency cannot be overstated. Regulatory deadlines approach rapidly, and the cost of non-compliance continues to escalate. Legacy systems that once served as reliable workhorses now require strategic transformation to meet modern security standards. This guide provides actionable strategies to prepare your legacy infrastructure for certification success.
10
min reading time

The European Union has launched an ambitious digital transformation initiative centered on digital identity and trust services. Building upon the foundation of the original eIDAS Regulation (Regulation (EU) No. 910/2014), the updated eIDAS 2.0 framework (Regulation (EU) 2024/1183) establishes a European Digital Identity (EUDI) Framework that requires all Member States to make interoperable EU Digital Identity Wallets available to citizens and businesses by 2026. This effort aims to create consistency in legal certainty, interoperability, and data protection across borders, strengthening trust in Europe’s digital landscape.
9
min reading time

The journey of achieving Common Criteria certification represents just the beginning of a complex, ongoing process that demands continuous attention and strategic management. Organizations worldwide invest significant resources in obtaining these prestigious security certifications, yet many underestimate the critical importance of proper lifecycle management once their products become Common Criteria certified. Effective CC certification lifecycle management ensures continuous security assurance, regulatory compliance, and market credibility throughout a product’s operational lifespan.
9
min reading time