
3
min reading time
Online security has become a key factor when it comes to customer trust and conducting business online. The representatives of organizations, legal authorities and consumers can all become hesitant to make an electronic transaction if they don’t feel as if their data would be adequately secured.
Luckily, the European Union established the eIDAS regulation five years ago (in 2014), which has been a crucial constituent of the European Commission’s initiative to form Digital Single Market (DSM) for EU Member States.
To celebrate the 5th anniversary of this key development, on 01 July 2021, you will be able to virtually attend the go.eIDAS Summit 2021 that will cover topics like;
Before we get down to the details of the event, and show you how you can make sure your company complies with eIDAS regulations, let’s start at the beginning and explore what is eIDAS exactly.
What is eIDAS?
eiDAS stands for electronic IDentification, Authentication and trust Services that aims to make electronic transactions more secure and trustworthy within the territory of the Union. It offers a standardized approach and a common blueprint for secure electronic interactions, such as payments or administration, between private individuals, businesses and public authorities nationally and internationally alike. eIDAS aims to increase the efficacy of public and private online services, electronic business and e-commerce within the internal market of the EU.

Image source: https://www.leypal.com/en/blog-electronic-signature-eidas/
What kind of trust services does this regulation include?
What are the advantages of eIDAS?
The former eSignature Directive (Directive 1999/93/EC) had many defects, as being a 15-years-old directive at the time of the establishment of eIDAS, it wasn’t able to keep up with the fast-paced technological advancement, and lacked specific directives about the supervision of national and international ICTs.
To further secure online transactions and to assure private individuals, authorities and organizations about the security of online transactions, eIDAS bridges the gap between a fastly changing societal demand and institutionalized regulation by;
Join the go.eIDAS Summit 2021
The organizers of the Summit have assembled a team of leading international experts and stakeholders from 10 different EU Member States in the sector of secure digital identities, trust services and mobile government The representatives of Austria, Belgium, France, Estonia, Germany, Italy, Latvia, Luxembourg, Spain and last but not least, the Netherlands, will talk about their latest experiences, knowledge and ideas about the past, present, and future of eIDAS and EU’s cybersecurity landscape.
If you are interested in the latest security trends, register, and join this panel of experts on 01 July 2021!
How to comply with cross-border and national eIDAS standards?
The Commission Implementing Decision 2016/650 specifies the unavoidable security assessment standards of qualified signature and seal creation devices (QSCD). At the same time, it also lays down the thresholds for their certification, which official conformity assessment bodies use as the foundation for their consultation, and compliance assessment services.
As the assessment of compliance of the applying service providers, and their services is carried out by a certified conformity assessment body, organizations need to go under a thorough analysis, and consult with an eIDAS specialist in order to obtain the conformity assessment report that they can provide to the supervisory board.
CCLab, an accredited software security laboratory, provides full support to service providers in order to help them fulfill the requirements of eIDAS. Our organization have demonstrated history and experience in:
Our team of experts make sure your organization meets all necessary prerequisites to obtain the eIDAS certification by analyzing your company and services, providing professional consultation about the necessary modifications, executing the conformity assessment, and compiling the report required by the supervisory board.


Get your FREE A-Z supporting material for smart meter security standards. Learn more about the Swiss METAS data security evaluation projects of smart metering devices.


Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.


Read and learn more about the Radio Equipment Directive (RED), download our free material now.

Legacy systems power critical operations across industries worldwide, yet they present unique challenges when organizations pursue Common Criteria certification. The clock is ticking for manufacturers and enterprises who must navigate complex compliance requirements while maintaining operational continuity. Organizations pursuing Common Criteria certification must address unique challenges when dealing with legacy infrastructure, but with the right approach, success is achievable. The urgency cannot be overstated. Regulatory deadlines approach rapidly, and the cost of non-compliance continues to escalate. Legacy systems that once served as reliable workhorses now require strategic transformation to meet modern security standards. This guide provides actionable strategies to prepare your legacy infrastructure for certification success.
10
min reading time

The European Union has launched an ambitious digital transformation initiative centered on digital identity and trust services. Building upon the foundation of the original eIDAS Regulation (Regulation (EU) No. 910/2014), the updated eIDAS 2.0 framework (Regulation (EU) 2024/1183) establishes a European Digital Identity (EUDI) Framework that requires all Member States to make interoperable EU Digital Identity Wallets available to citizens and businesses by 2026. This effort aims to create consistency in legal certainty, interoperability, and data protection across borders, strengthening trust in Europe’s digital landscape.
9
min reading time

The journey of achieving Common Criteria certification represents just the beginning of a complex, ongoing process that demands continuous attention and strategic management. Organizations worldwide invest significant resources in obtaining these prestigious security certifications, yet many underestimate the critical importance of proper lifecycle management once their products become Common Criteria certified. Effective CC certification lifecycle management ensures continuous security assurance, regulatory compliance, and market credibility throughout a product’s operational lifespan.
9
min reading time