
2
min reading time
It proved to be a good decision to continue our workshop on Common Criteria on 9th June 2022. Many professionals attended to get first-hand information and updates from the world of CC and there has also been a lot of interest in CCGuide, our new educational material. Once again we made the presentations available on-demand to those who were unable to attend.
With many years of experience behind us, we also faced several challenges from our clients, which gave us the idea to organize a workshop onCommon Criteria last autumn. Our goal was to provide useful information and consultancy in preparing for Common Criteria evaluation. However, the world of CC is constantly changing, so the next workshop on this topic seemed necessary.
We have now tried to approach the topic of our workshop from several perspectives. Therefore in addition to CCLab’s experts, we invited as a guest speaker Mr. Hendrik Dettmer from TÜV Trust-IT, to speak about the expected changes related to the EUCC, and Mr. Marc Le Guin from TÜViT to share his experiences with BSI.
What could the participants learn?
- The future role of national schemes – dr. Katalin Szűcs
- Latest updates on EUCC scheme – Hendrik Dettmer
- BSI vs. OCSI- differences between the German and Italian scheme – Bence Szabó & Marc Le Guin
- Best practices for Common Criteria- zero to hero– Jonatán Bodó
- Introducing CCGuide, our new educational tool –Dániel Király
If you have missed any of our Common Criteria workshops, here’s the chance to check them out on-demand:
Common Criteria, the security passport - Part 1.
Common Criteria, the security passport - Part 2.
Are you interested in CCGuide early access program? Contact us and we will help you!


This downloadable infographics introduces the Common Criteria Evaluation process to you. Explore now for free.


Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.


Download our ETSI EN 303 635 infographics today and learn about the product certification process for this consumer IoT device cybersecurity standard.

The European Union has launched an ambitious digital transformation initiative centered on digital identity and trust services. Building upon the foundation of the original eIDAS Regulation (Regulation (EU) No. 910/2014), the updated eIDAS 2.0 framework (Regulation (EU) 2024/1183) establishes a European Digital Identity (EUDI) Framework that requires all Member States to make interoperable EU Digital Identity Wallets available to citizens and businesses by 2026. This effort aims to create consistency in legal certainty, interoperability, and data protection across borders, strengthening trust in Europe’s digital landscape.
9
min reading time

The journey of achieving Common Criteria certification represents just the beginning of a complex, ongoing process that demands continuous attention and strategic management. Organizations worldwide invest significant resources in obtaining these prestigious security certifications, yet many underestimate the critical importance of proper lifecycle management once their products become Common Criteria certified. Effective CC certification lifecycle management ensures continuous security assurance, regulatory compliance, and market credibility throughout a product’s operational lifespan.
9
min reading time

In an increasingly interconnected world, cybersecurity has become more than just a technical requirement, it's a critical shield protecting organizations from potential digital threats. Common Criteria (CC), an internationally recognized standard also known as ISO/IEC 15408, emerges as a comprehensive framework that meticulously evaluates the security properties of IT products and systems. This international standard provides a structured approach to assessing technological security, offering governments, enterprises, and technology developers a robust methodology for understanding and validating the security mechanisms embedded within their digital solutions. Moreover, Common Criteria serves as a critical benchmark, ensuring that technological products meet rigorous security standards before entering the marketplace.
10
min reading time