Common Criteria
consultation, ISO 15408 support

If you are looking for a Common Criteria expert, who can help
you get prepared and easily get over the difficulties of the certification process,
then you are at the right place.

get a free consult

EUCC, the new EU-wide cybersecurity certification scheme, officially entered into force at the end of February 2025.

Start your CC certification project now: certificates issued under national schemes during the transition remain valid for five years, even after EUCC took effect, giving you time to adapt without rushing.
Developers and sponsors should note that while the existing Common Criteria national schemes are being phased out, ongoing certifications must be finalized by February 2026.
Now is the right time to start your CC certification project with the established, well-known processes to save time and extra effort.

Companies who chose us

cclab-common-criteria-compliance-consultancy

Professional Common Criteria Consultancy for EAL4+ Compliance 

Save cost and effort!
During our consulting services the experts will guide you through the common criteria requirements, so you can:

  • Accelerate preparation

  • Save cost and effort

  • Avoid mistakes

  • Create high quality developer documents

  • Prepare your product for a successful certification project

  • Maximize efficiency of evaluation

  • Spare your organization from unnecessary iterations

Professional Support for ISO 15408 Common Criteria Compliance

If you are new to Common Criteria certification or in need of professional support, contact us and we will be happy to guide you through the possibilities. Our consulting may include:

  • Active cooperation with development team

  • Active support for documentation

  • Template creation

  • Document writing

  • Ongoing consultation with experts in the field

  • Design review

  • Security Target Creation

  • Pre-Vulnerability Assessment

Certified Common Criteria Evaluators

Our consultants are OCSI certified (Italian Certification Body) and TrustCBcertified (Dutch Certification Body) Common Criteria evaluators, experienced in Common Criteria guidelines, tips and tricks of evaluations such as:

How to create the proper, high quality documentation?

How to upgrade your development site security?

How to prepare and develop your product in the most secure, efficient and fastest way?

Ready for your next Common Criteria certification project?

We can support you from day one, once you decide on certifying your product.

get a free consult

Webinars on Common Criteria Compliance

Do you want to know more about Common Criteria evaluation?
Do you want to know how you can get your product certified?

Exploring EUCC: Legal, Market Impact, and Practical Application
On-demand
Dr. Katalin Szűcs
Levente Cseh
May 29, 2024

Exploring EUCC: Legal, Market Impact, and Practical Application

Register CCLab's on-demand webinar on EUCC, the EU Cybersecurity Certification Scheme

CCLab is excited to announce its free on-demand webinar on European Cybersecurity Certification (EUCC) Scheme. Register now and delve into the intricacies of EUCC and its implications for cybersecurity stakeholders.

LEARN MORE
COMMON CRITERIA, THE SECURITY PASSPORT  Part 2
On-demand
Dr. Katalin Szűcs
Jonatán Bodó
Imre Fodor
Hendrik Dettmer
Marc Le Guin
June 9, 2022

COMMON CRITERIA, THE SECURITY PASSPORT Part 2

Find out everything you need to know about Common Criteria evaluation & learn more about our new CC educational material, CCGuide

Find out everything you need to know about Common Criteria evaluation & learn more about our new CC educational material, CCGuide.

LEARN MORE

Documents for Common Criteria evaluation

Is this you?

Are you struggling to prepare the required Developer Documents for your upcoming Common Criteria certification project? 

Do you think you could use the already existing docs for your product's evaluation? 

Do you think it is time-consuming or sometimes even confusing to comply with Common Criteria requirements?

If you are preparing for your first Common Criteria certification project, or you already have
experience with CC evaluation but are willing to save some time and money in preparation.

Then this course is made for you.

Enroll now

Standards and Protection Profiles
we have experience with the

Selection of Protection Profiles
(examples only)

EN 419 211-2 / BSI-CC-PP-0059-2009-MA-01, Version 2.0.1

Secure signature creation device - Part 2: Device with key generation / Protection profiles for secure signature creation device – Part 2: “Device with Key Generation”

EN 419 211-3 / BSI-CC-PP-0075-2012, Version 2.0.1

Secure signature creation device - Part 3: Device with key import / Protection profiles for secure signature creation device - Part 3: Device with key import

EN 419 211-4 / BSI-CC-PP-0071-2012, Version 2.0.1

Secure signature creation device - Part 4: Extension for device with key generation and trusted communication with certificate generation application / Protection profiles for secure signature creation device – Part 4: “Extension for device with key generation and trusted communication with certificate generation application”

EN 419 211-5 / BSI-CC-PP-0072-2012, Version 2.0.1

Secure signature creation device - Part 5: Cryptographic Module for Trust Services / Protection profiles for secure signature creation device – Part 5: Extension for device with key generation and trusted communication with signature creation application

EN 419 211-6 / BSI-CC-PP-0076-2013, Version 2.0.1

Secure signature creation device - Part 6: Extension for device with key import and trusted communication with signature creation application / Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application

EN 419 241-2

Trustworthy Systems Supporting Server Signing Part 2: Protection Profile for QSCD for Server Signing

EN 419-221-5

Protection profiles for TSP Cryptographic modules - Part 5 Cryptographic Module for Trust Services

Protection Profile for Certification Authorities

Version 2.1, 2018-12-01 (NIAP)

Protection Profile Module For Stateful Traffic Filter Firewalls

Version 1.3, 2019-09-27

Protection Profile For Mobile Device Fundamentals

Version 3.2, 2021-04-15

Protection Profile For Application Software

Version 1.4, 2021-10-07

CIMC PP

Certificate Issuing and Management Components Protection Profile, Version 1.5

Protection Profile for Application Software,

Version 1.4 (2021-10-07)

Collaborative Protection Profile For Network Devices

Version 2.2e, 2020-03-23

Protection Profile- Module For Private Network (VPN) Gateways,

Version 1.1, 2020-06-18

General Purpose Operating Systems Protection Profile/ Mobile Device Fundamentals Protection Profile Extended Package (EP) Wireless Local Area Network (WLAN) Clients

Version 1.0, 2016-02-08

Functional Package For Transport Layer Security

Version 1.1, 2019-02-12

  • Does CC certification take time and effort?
  • Will Common Criteria evaluation cost you?
  • Will Common Criteria certification be worth it?
YES

Get Common Criteria EAL4+ certified in 4 months with agile methods

We use agile methodologies and toolsets imported from software development in project management and customer development.

Thanks to our improved processes an EAL4+ evaluation can be finished in 4 months!

Our Common Criteria testing laboratory staff is highly experienced, involved in CC evaluations for more than a decade.

see our references
common-criteria-compliance-duration

Selection of Products
we have experience with

(examples only)

Identity Card Applets / Electronic identification (EiD)

EAC - PACE - AA - BAC

Java Card Open Platform (JCOP)

Hardware Security Module (HSM), Cryptographic Module (CM)

Electronic identification (EiD)

Signature Activation Module (SAM)

Qualified Signature Creation Device (QSCD) / Secure Signature Creation Device (SSCD)

Network device software, firmware

Firewall appliance

Stateful Traffic Filter Firewalls

Private Network (VPN) Gateways

Logical and physical machine readable travel documents

Mobile Devices

WLAN Clients

Application Software

Transport Layer Security client or server

Testimonials

Kenneth Lasoski

Kenneth Lasoski

Versa Networks

Evaluation team was extremely reasonable and flexible with resolution to findings and was helpful in finding agreeable solutions for CB comments. Consultation team was always responsive and helped shape the documentation for easier evaluation, and provided useful recommendations on satisfying SFR/SARs.

Thierry Bonda

Thierry Bonda

Landis+Gyr

CCLab was well prepared, flexible during the whole evaluation process, and supported us with continuous communication and guidance. Many lessons were learnt during the project and CCLab has always been looking for solutions, supporting our developers the best way they could. The new Swiss evaluation methodology was a good and professional basis to work with, but both parties had to learn how to deal with it.

Jake Nelson

Jake Nelson

Corsec Security Inc.

The relationship between Corsec and CCLab has been instrumental in helping product vendors successfully complete the Common Criteria certification process. As a Common Criteria consultant to the product vendor, Corsec relies on CCLab’s responsiveness and expertise to quickly and thoroughly complete the testing component of the process. CCLab has been essential in managing multiple projects, their professionalism has helped ensure product vendor satisfaction and ultimate project success.

Alexander Testov

Alexander Testov

AO Kaspersky Lab.

"I would definitely recommend CCLab to anyone in need of Common Criteria certification. Our cooperation was comfortable, well organized and efficient. I am totally satisfied with the result."

Dayton Marcucci

Dayton Marcucci

HID Global

The CCLab team gave us full support to adapt to the changes during product development. Whatever the challenges faced they could keep the due dates and we were able to complete the process quickly and efficiently. The real agile lab helped our success. We are going to work with them again. I highly recommend them to anyone wanting to get its product certified.

Jaime Chica

Jaime Chica

NXP Semiconductors

It was a well-managed project which achieved success in an effortless manner.

Kalev Pihl

Kalev Pihl

SK ID Solutions

We needed a lab that works quickly but with high work morale and quality of work. CCLab is exactly like that! It was good cooperation experience to work with them. The project was rather complex and our expectations maybe even too high, but the team was committed to the common goals and could keep the milestones; therefore we were able to deliver what was needed. I highly recommend CCLab team to anyone for their great team spirit, quality orientations, agility and reasonable pricing.

Israr Ahmed

Israr Ahmed

Ascertia Ltd.

On behalf of Ascertia, accept my appreciation for the excellent job done by CCLab team over the past several months in achieving the Common Criteria Certificate for ADSS Server SAM solution. It was an enormous undertaking but went smoothly and efficiently! Thanks to your leadership and dedication combined with your staff's teamwork and energy, we achieved our target. You and your employees should take great pride in this accomplishment. We look forward to extend our work with you for our next certification milestone and hope will continue to get such excellent service.

Zsolt Rózsahegyi

Zsolt Rózsahegyi

I4P Informatics Ltd.

Thanks to the agile processes we've been able to add new features to the product during the evaluation that made it even more valuable to customers. CCLAB efficiently supported us throughout the whole change management process. The predictability, accurate scheduling, and supportive mindset helped us to finish the project in time.

FAQ

What is Common Criteria?

The Common Criteria (CC) is an international standard for evaluating the security properties of IT products and systems, formally published as ISO/IEC 15408. It defines a structured framework for specifying security requirements, outlines the methodology for assessing whether those requirements are met, and sets rules for the oversight of these evaluations.

Governments and organizations worldwide use the CC to assess and certify the security of information technology products. In many cases, compliance with the Common Criteria is a prerequisite for procurement.

For more information or to obtain the standard, visit: https://www.commoncriteriaportal.org.

Who recognizes CC certificates?

The most widely adopted mutual recognition framework is the Common Criteria Recognition Arrangement (CCRA). As of this writing, signatory nations include: Australia, Austria, Canada, Czech Republic, Denmark, Ethiopia, Finland, France, Germany, Greece, Hungary, India, Indonesia, Israel, Italy, Japan, Republic of Korea, Malaysia, the Netherlands, New Zealand, Norway, Pakistan, Poland, Qatar, Singapore, Spain, Sweden, Turkey, the United Kingdom, and the United States.

The official and up-to-date list of CCRA participants is maintained at:

https://www.commoncriteriaportal.org/ccra/members/index.cfm.

Other recognition frameworks also exist:

  • SOG-IS Mutual Recognition Agreement – Within Europe, SOG-IS allows mutual recognition among its members, often supporting higher assurance levels than CCRA.
  • EUCC – The European Union Cybersecurity Certification Scheme based on Common Criteria, developed under the EU Cybersecurity Act, will provide an EU-wide CC-based certification framework. Once fully operational, EUCC will harmonize and replace certain national arrangements within the EU, offering a standardized recognition path for CC-based evaluations across all EU Member States.
  • Bilateral agreements – Some countries maintain one-to-one recognition agreements.
  • Independent use – Certain nations (e.g., China) and organizations may adopt and apply the ISO/IEC 15408 standard without participating in formal recognition schemes.

What is the CC evaluation process?

There are three parties involved in the CC evaluation process:

 

1. Vendor or Sponsor. The vendor/developer engages an accredited laboratory and submits their product and associated evidence for evaluation.

2. Laboratory. The laboratory performs the evaluation and reports evaluation results to the scheme. Evaluation is iterative in nature and the vendor is able to address findings during the evaluation.

3. Scheme. Certificate authorizing schemes (also known as a certification body) issue CC certificates and perform certification/validation oversight of the laboratory. Each scheme has its own policies with regard to how the CC is used in that country and what products may be accepted into evaluation

What gets evaluated?

The following provides a high-level overview of what gets evaluated:

Documents defining the evaluation:

Security Target evaluation. Evaluation of the Security Target (ST) - a claims document that specifies the security functions under evaluation and the security assurance requirements being met.

Protection Profile evaluation. Evaluation of the Protection Profile (PP) - an implementation-independent statement of security needs for a technology type.

The product (technically called a Target of Evaluation (TOE). These evaluations can include:

  • Development Evaluation. Involves a thorough review of design, architecture, functional specification etc. documents, which can range from a simple interface specification to comprehensive layers of detailed design documentation and even source code examination, depending on the level of assurance required.
  • Guidance evaluation. Examination of the product’s guidance materials, including any CC-specific documentation such as secure installation guides, to ensure users can correctly configure the evaluated version of the product..
  • Life-cycle evaluation. Evaluation of configuration management practices, delivery procedures and vulnerability or flaw remediation processes. At higher assurance levels this can also cover development environment security and on-site security audits..
  • Functional testing. Re-execution of a sample of the developer’s functional tests, coupled with independent tests designed by the evaluators to verify that the security functions operate as described in the ST.
  • Vulnerability analysis / Penetration testing. Identification of potential vulnerabilities and active attempts to exploit them, to confirm the TOE meets the claimed assurance level.

Whether each of these activities is performed, and to what extent, depends on the specific assurance requirements stated in the Security Target.

What is a Security Target?

A Security Target is the document that defines the Target of Evaluation (TOE), that is, the product configuration version, and scope of security functionality to be assessed. The CC allows the TOE to be all or part of a product or system. The Security Target is put together using CC constructs and includes a threat model, environmental assumptions, security objectives, security functional requirements and security assurance requirements. The ST is prepared by the vendor and may optionally claim conformance to one or more Protection Profiles (PP). Unlike a PP—typically created from the consumer’s perspective—the ST describes in detail how the product meets the defined security requirements.

Examples of publicly available Security Targets can be found at: https://www.commoncriteriaportal.org/products/index.cfm .

What is a Protection Profile?

A Protection Profile is an implementation-independent statement of security requirements for a particular type of technology. PPs are defined using CC constructs and often published by governments or industry bodies to guide procurement. Each PP specifies both functional and assurance requirements, which products aiming for CC certification can address.

A single product may conform to multiple PPs if relevant.

A central repository of PPs is available at:

https://www.commoncriteriaportal.org/pps/index.cfm

What is a Collaborative Protection Profile (cPP)?

A Collaborative Protection Profile (cPP) is a type of Protection Profile developed jointly by international technical communities and endorsed by multiple national CC schemes. The collaborative approach ensures that security requirements for a given technology are consistent, mutually recognized, and reflect international consensus. This process is coordinated via the Common Criteria Working Groups, with participation from government, industry, and academic experts.

More information and a list of current cPPs can be found at:https://www.commoncriteriaportal.org/pps/collaborativePP.cfm?cpp=1&CFID=50449855&CFTOKEN=128d3f224a6fcbd2-9042B106-155D-00D0-0AA2F31A79DB3F05

What is an Evaluation Assurance Level?

An Evaluation Assurance Level (EAL) is one of several predefined sets of assurance requirements ranging from EAL1 (Functionally Tested) to EAL7 (Formally Verified Design and Tested). A Protection Profile or Security Target may reference an Evaluation Assurance Level (EAL), or, alternatively, describe a custom assurance package tailored to their requirements rather than using a predefined EAL.

How long does evaluation take?

A CC evaluation project typically lasts several months, but actual duration depends on many factors such as product complexity assurance claims and completeness of product documentation. An evaluation project includes product preparation (including necessary configuration and testing), documentation preparation by the vendor, engagement with an accredited evaluation laboratory, laboratory evaluation activities and finally certification by the Certification Body.

What happens when a certified product changes?

CC certification only applies to the configurations and versions specified by the certified Security Target. For example, if a certified product is updated from version 1.0 to 1.0.1, the original certificate does not automatically apply to the new version. Some certification schemes may offer longer certificate validity with update provisions, provided the changes are assessed and approved. In most cases, product changes are handled through the Assurance Continuity process.

What is Assurance Continuity?

Assurance Continuity allows minor, non-security-impacting changes to be appended to the existing CC certificate without a full re-evaluation. In cases where changes are security-relevant (and are classified as ‘major’), Assurance Continuity allows these changes to be rapidly evaluated through ‘re-evaluation’, which utilizes results from the original evaluation.

Note: Policies and implementation details for Assurance Continuity vary across national schemes.

Further details about the Assurance Continuity program are included in the Common Criteria Recognition Arrangement (CCRA).

Supporting Documents at https://www.commoncriteriaportal.org/cc/index.cfm#supporting.

Why buy Common Criteria certified products?

CC certified products have undergone a rigorous evaluation process performed by accredited third-party security labs in accordance with internationally accepted criteria and a government-managed framework. Specific advantages include:

  • Product security functions have been verified and tested
  • Independent evaluators have assessed the product for known vulnerabilities and attempted to exploit potential weaknesses.
  • Development practices, configuration management, and vulnerability remediation processes have been reviewed for compliance.
  • The product meets formal CC certification requirements often specified in government and regulated-industry procurement policies
  • Certificates may be accepted internationally under agreements such as the Common Criteria Recognition Arrangement (CCRA) or, for EU markets, the EUCC scheme.

Which protection profiles do CCLAB work with?

  • EN 419 211-2 (Secure signature creation device - Part 2: Device with key generation)
  • EN 419 211-3 (Secure signature creation device - Part 3: “Device with key import”)
  • EN 419 211-4 (Secure signature creation device - Part 4: “Extension for device with key generation and trusted communication with certificate generation application”)
  • EN 419 211-5 (Secure signature creation device - Part 5: “Cryptographic Module for Trust Services”)
  • EN 419 211-6 (Secure signature creation device - Part 6: Extension for device with key import and trusted communication with signature creation application)
  • EN 419 241-2 (Trustworthy Systems Supporting Server Signing Part 2: Protection Profile for QSCD for Server Signing)
  • EN 419-221-5 (Protection profiles for TSP Cryptographic modules - Part 5 Cryptographic Module for Trust Services)
  • Protection Profile For Application Software

Version 1.4, 2021-10-07

  • Collaborative Protection Profile For Network Devices

Version 2.2e, 2020-03-23

  • Functional Package For Transport Layer Security

Version 1.1, 2019-02-12

  • Protection Profile for Certification Authorities

Version 2.1, 2018-12-01 (NIAP)

  • Protection Profile Module For Stateful Traffic Filter Firewalls

Version 1.3, 2019-09-27

  • Protection Profile For Mobile Device Fundamentals

Version 3.2, 2021-04-15

  • CIMC PP

Certificate Issuing and Management Components Protection Profile, Version 1.5

  • Protection Profile- Module For Private Network (VPN) Gateways,

Version 1.1, 2020-06-18

  • General Purpose Operating Systems Protection Profile/ Mobile Device Fundamentals Protection Profile Extended Package (EP) Wireless Local Area Network (WLAN) Clients

Version 1.0, 2016-02-08

What is a common criteria certification good for?

A Common Criteria (CC) certification provides independent assurance that an IT product meets defined security requirements at a specified Evaluation Assurance Level (EAL). Common Criteria certifications are one of the widely recognized, and internationally standardized information security solutions in the world. Thanks to the CCRA (Common Criteria Recognition Arrangement ) and further mutual agreements, the certified product owners are in the especial position, where marketing their product worldwide not only in compliance with expected information technology security requirements (which is a CC certification in the most cases when it comes to tenders), but the evidence of the product’s compliance of up to date international professional standards.

Who needs common criteria evaluation?

Such certifications are mainly requested by the developers. In case you are in the process of creating a new software or hardware product, you have probably come across the opportunity to secure your product to a certain level. Common Criteria evaluations are for those, who are already prepared for such IT security challenges or welcome the work which leads to a globally acceptable high-end security certification.

Which Common Criteria scheme does CCLAB work with?

CCLab is accredited by the Italian OCSI (Organismo di Certificazione della Sicurezza Informatica) and also the Dutch TrustCB, which are part of the EUCC scheme.

Most common protection profiles

  • EN 419 211-2 (Secure signature creation device - Part 2: Device with key generation) / BSI-CC-PP-0059-2009-MA-01, Version 2.0.1

(Protection profiles for secure signature creation device – Part 2: “Device with Key Generation”)

  • EN 419 211-3 (Secure signature creation device - Part 3: “Device with key import”) / BSI-CC-PP-0075-2012, Version 2.0.1 (Protection profiles for secure signature creation device - Part 3: Device with key import)
  • EN 419 211-4 (Secure signature creation device - Part 4: “Extension for device with key generation and trusted communication with certificate generation application”) / BSI-CC-PP-0071-2012, Version 2.0.1

(Protection profiles for secure signature creation device – Part 4: “Extension for device with key generation and trusted communication with certificate generation application”)

  • EN 419 211-5 (Secure signature creation device - Part 5: “Cryptographic Module for Trust Services”) / /BSI-CC-PP-0072-2012, Version 2.0.1
  • (Protection profiles for secure signature creation device – Part 5: Extension for device with key generation and trusted communication with signature creation application)
  • EN 419 211-6 (Secure signature creation device - Part 6: Extension for device with key import and trusted communication with signature creation application) / BSI-CC-PP-0076-2013, Version 2.0.1 (Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application)
  • EN 419 241-2 (Trustworthy Systems Supporting Server Signing Part 2: Protection Profile for QSCD for Server Signing)
  • EN 419-221-5 (Protection profiles for TSP Cryptographic modules - Part 5 Cryptographic Module for Trust Services) 
  • CIMC PP Certificate Issuing and Management Components Protection Profile, Version 1.5
  • Protection Profile for Certification Authorities Version 2.1, 2018-12-01
  • Collaborative Protection Profile For Network Devices, Version 2.2e, 2020-03-23
  • Protection Profile Module For Stateful Traffic Filter Firewalls Version 1.3, 2019-09-27
  • Protection Profile- Module For Private Network (VPN) Gateways, Version 1.1, 2020-06-18
  • Protection Profile For Mobile Device Fundamentals, Version 3.2, 2021-04-15
  • General Purpose Operating Systems Protection Profile/ Mobile Device Fundamentals Protection Profile Extended Package (EP) Wireless Local Area Network (WLAN) Clients, Version 1.0, 2016-02-08
  • Protection Profile For Application Software, Version 1.4, 2021-10-07
  • Functional Package For Transport Layer Security, Version 1.1, 2019-02-12