If you are looking for a Common Criteria expert, who can help
you get prepared and easily get over the difficulties of the certification process,
then you are at the right place.

Start your CC certification project now: certificates issued under national schemes during the transition remain valid for five years, even after EUCC took effect, giving you time to adapt without rushing.
Developers and sponsors should note that while the existing Common Criteria national schemes are being phased out, ongoing certifications must be finalized by February 2026.
Now is the right time to start your CC certification project with the established, well-known processes to save time and extra effort.

Save cost and effort!
During our consulting services the experts will guide you through the common criteria requirements, so you can:
Accelerate preparation
Save cost and effort
Avoid mistakes
Create high quality developer documents
Prepare your product for a successful certification project
Maximize efficiency of evaluation
Spare your organization from unnecessary iterations
If you are new to Common Criteria certification or in need of professional support, contact us and we will be happy to guide you through the possibilities. Our consulting may include:
Active cooperation with development team
Active support for documentation
Template creation
Document writing
Ongoing consultation with experts in the field
Design review
Security Target Creation
Pre-Vulnerability Assessment
Our consultants are OCSI certified (Italian Certification Body) and TrustCBcertified (Dutch Certification Body) Common Criteria evaluators, experienced in Common Criteria guidelines, tips and tricks of evaluations such as:
We can support you from day one, once you decide on certifying your product.
Do you want to know more about Common Criteria evaluation?
Do you want to know how you can get your product certified?

CCLab is excited to announce its free on-demand webinar on European Cybersecurity Certification (EUCC) Scheme. Register now and delve into the intricacies of EUCC and its implications for cybersecurity stakeholders.

Find out everything you need to know about Common Criteria evaluation & learn more about our new CC educational material, CCGuide.
Are you struggling to prepare the required Developer Documents for your upcoming Common Criteria certification project?
Do you think you could use the already existing docs for your product's evaluation?
Do you think it is time-consuming or sometimes even confusing to comply with Common Criteria requirements?
If you are preparing for your first Common Criteria certification project, or you already have
experience with CC evaluation but are willing to save some time and money in preparation.

Secure signature creation device - Part 2: Device with key generation / Protection profiles for secure signature creation device – Part 2: “Device with Key Generation”
Secure signature creation device - Part 3: Device with key import / Protection profiles for secure signature creation device - Part 3: Device with key import
Secure signature creation device - Part 4: Extension for device with key generation and trusted communication with certificate generation application / Protection profiles for secure signature creation device – Part 4: “Extension for device with key generation and trusted communication with certificate generation application”
Secure signature creation device - Part 5: Cryptographic Module for Trust Services / Protection profiles for secure signature creation device – Part 5: Extension for device with key generation and trusted communication with signature creation application
Secure signature creation device - Part 6: Extension for device with key import and trusted communication with signature creation application / Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application
Trustworthy Systems Supporting Server Signing Part 2: Protection Profile for QSCD for Server Signing
Protection profiles for TSP Cryptographic modules - Part 5 Cryptographic Module for Trust Services
Version 2.1, 2018-12-01 (NIAP)
Version 1.3, 2019-09-27
Version 3.2, 2021-04-15
Version 1.4, 2021-10-07
Certificate Issuing and Management Components Protection Profile, Version 1.5
Version 1.4 (2021-10-07)
Version 2.2e, 2020-03-23
Version 1.1, 2020-06-18
Version 1.0, 2016-02-08
Version 1.1, 2019-02-12
We use agile methodologies and toolsets imported from software development in project management and customer development.
Thanks to our improved processes an EAL4+ evaluation can be finished in 4 months!
Our Common Criteria testing laboratory staff is highly experienced, involved in CC evaluations for more than a decade.

The Common Criteria (CC) is an international standard for evaluating the security properties of IT products and systems, formally published as ISO/IEC 15408. It defines a structured framework for specifying security requirements, outlines the methodology for assessing whether those requirements are met, and sets rules for the oversight of these evaluations.
Governments and organizations worldwide use the CC to assess and certify the security of information technology products. In many cases, compliance with the Common Criteria is a prerequisite for procurement.
For more information or to obtain the standard, visit: https://www.commoncriteriaportal.org.
The most widely adopted mutual recognition framework is the Common Criteria Recognition Arrangement (CCRA). As of this writing, signatory nations include: Australia, Austria, Canada, Czech Republic, Denmark, Ethiopia, Finland, France, Germany, Greece, Hungary, India, Indonesia, Israel, Italy, Japan, Republic of Korea, Malaysia, the Netherlands, New Zealand, Norway, Pakistan, Poland, Qatar, Singapore, Spain, Sweden, Turkey, the United Kingdom, and the United States.
The official and up-to-date list of CCRA participants is maintained at:
https://www.commoncriteriaportal.org/ccra/members/index.cfm.
Other recognition frameworks also exist:
There are three parties involved in the CC evaluation process:
1. Vendor or Sponsor. The vendor/developer engages an accredited laboratory and submits their product and associated evidence for evaluation.
2. Laboratory. The laboratory performs the evaluation and reports evaluation results to the scheme. Evaluation is iterative in nature and the vendor is able to address findings during the evaluation.
3. Scheme. Certificate authorizing schemes (also known as a certification body) issue CC certificates and perform certification/validation oversight of the laboratory. Each scheme has its own policies with regard to how the CC is used in that country and what products may be accepted into evaluation
The following provides a high-level overview of what gets evaluated:
Documents defining the evaluation:
Security Target evaluation. Evaluation of the Security Target (ST) - a claims document that specifies the security functions under evaluation and the security assurance requirements being met.
Protection Profile evaluation. Evaluation of the Protection Profile (PP) - an implementation-independent statement of security needs for a technology type.
The product (technically called a Target of Evaluation (TOE). These evaluations can include:
Whether each of these activities is performed, and to what extent, depends on the specific assurance requirements stated in the Security Target.
A Security Target is the document that defines the Target of Evaluation (TOE), that is, the product configuration version, and scope of security functionality to be assessed. The CC allows the TOE to be all or part of a product or system. The Security Target is put together using CC constructs and includes a threat model, environmental assumptions, security objectives, security functional requirements and security assurance requirements. The ST is prepared by the vendor and may optionally claim conformance to one or more Protection Profiles (PP). Unlike a PP—typically created from the consumer’s perspective—the ST describes in detail how the product meets the defined security requirements.
Examples of publicly available Security Targets can be found at: https://www.commoncriteriaportal.org/products/index.cfm .
A Protection Profile is an implementation-independent statement of security requirements for a particular type of technology. PPs are defined using CC constructs and often published by governments or industry bodies to guide procurement. Each PP specifies both functional and assurance requirements, which products aiming for CC certification can address.
A single product may conform to multiple PPs if relevant.
A central repository of PPs is available at:
A Collaborative Protection Profile (cPP) is a type of Protection Profile developed jointly by international technical communities and endorsed by multiple national CC schemes. The collaborative approach ensures that security requirements for a given technology are consistent, mutually recognized, and reflect international consensus. This process is coordinated via the Common Criteria Working Groups, with participation from government, industry, and academic experts.
More information and a list of current cPPs can be found at:https://www.commoncriteriaportal.org/pps/collaborativePP.cfm?cpp=1&CFID=50449855&CFTOKEN=128d3f224a6fcbd2-9042B106-155D-00D0-0AA2F31A79DB3F05
An Evaluation Assurance Level (EAL) is one of several predefined sets of assurance requirements ranging from EAL1 (Functionally Tested) to EAL7 (Formally Verified Design and Tested). A Protection Profile or Security Target may reference an Evaluation Assurance Level (EAL), or, alternatively, describe a custom assurance package tailored to their requirements rather than using a predefined EAL.
A CC evaluation project typically lasts several months, but actual duration depends on many factors such as product complexity assurance claims and completeness of product documentation. An evaluation project includes product preparation (including necessary configuration and testing), documentation preparation by the vendor, engagement with an accredited evaluation laboratory, laboratory evaluation activities and finally certification by the Certification Body.
CC certification only applies to the configurations and versions specified by the certified Security Target. For example, if a certified product is updated from version 1.0 to 1.0.1, the original certificate does not automatically apply to the new version. Some certification schemes may offer longer certificate validity with update provisions, provided the changes are assessed and approved. In most cases, product changes are handled through the Assurance Continuity process.
Assurance Continuity allows minor, non-security-impacting changes to be appended to the existing CC certificate without a full re-evaluation. In cases where changes are security-relevant (and are classified as ‘major’), Assurance Continuity allows these changes to be rapidly evaluated through ‘re-evaluation’, which utilizes results from the original evaluation.
Note: Policies and implementation details for Assurance Continuity vary across national schemes.
Further details about the Assurance Continuity program are included in the Common Criteria Recognition Arrangement (CCRA).
Supporting Documents at https://www.commoncriteriaportal.org/cc/index.cfm#supporting.
CC certified products have undergone a rigorous evaluation process performed by accredited third-party security labs in accordance with internationally accepted criteria and a government-managed framework. Specific advantages include:
Version 1.4, 2021-10-07
Version 2.2e, 2020-03-23
Version 1.1, 2019-02-12
Version 2.1, 2018-12-01 (NIAP)
Version 1.3, 2019-09-27
Version 3.2, 2021-04-15
Certificate Issuing and Management Components Protection Profile, Version 1.5
Version 1.1, 2020-06-18
Version 1.0, 2016-02-08
A Common Criteria (CC) certification provides independent assurance that an IT product meets defined security requirements at a specified Evaluation Assurance Level (EAL). Common Criteria certifications are one of the widely recognized, and internationally standardized information security solutions in the world. Thanks to the CCRA (Common Criteria Recognition Arrangement ) and further mutual agreements, the certified product owners are in the especial position, where marketing their product worldwide not only in compliance with expected information technology security requirements (which is a CC certification in the most cases when it comes to tenders), but the evidence of the product’s compliance of up to date international professional standards.
Such certifications are mainly requested by the developers. In case you are in the process of creating a new software or hardware product, you have probably come across the opportunity to secure your product to a certain level. Common Criteria evaluations are for those, who are already prepared for such IT security challenges or welcome the work which leads to a globally acceptable high-end security certification.
CCLab is accredited by the Italian OCSI (Organismo di Certificazione della Sicurezza Informatica) and also the Dutch TrustCB, which are part of the EUCC scheme.
(Protection profiles for secure signature creation device – Part 2: “Device with Key Generation”)
(Protection profiles for secure signature creation device – Part 4: “Extension for device with key generation and trusted communication with certificate generation application”)