Accurate data collection and secure data transfer are a must for the smart meter market. Smart metering solutions need to be METAS certified (METAS Zertifizierung) in Switzerland since 2019.
CCLab has become one of the leading accredited electric meter testing laboratories in cybersecurity evaluations of smart metering solutionsfor the energy industry. Among others we have great experience in data security evaluations in Switzerland under the METAS certification scheme.

According to the Electricity Supply Ordinance (Stromversorgungsverordnung), Switzerland has taken a big step forward by standardizing the requirements for Smart Metering Environments.
Thanks to thorough data security evaluation processes, METAS certificates are issued based on independent third party evaluation done by accredited Laboratories.
Keep your solution up to date regarding smart meter security risk and data security vulnerabilities.
CCLab has been involved in the preparation of procedures and security functionalities while supporting Swissmig community since the beginning, hence our continuous experience to deliver smart meter security evaluations and METAS certs professionally and quickly. We have pre-evaluated and certified a number of Head-End-Systems, Gateways and Smart Meters (IMS | Intelligent Measurement Devices | intelligenten Messsysteme)

Find all of the necessary documents and information about swiss smart meter evaluations at our FAQ section.
For up to date information and processes, see the Data Security Checks site of METAS certification.
Get your A-Z supporting material for evaluation projects:


Practical information and recommendations for Smart Meter Manufacturers according to the Swiss Data Security Examination processes and introduction of the Common Criteria Protection Profile for Smart Meter Security.
Our sales team will guide you through the possibilities of certifying your:
Smart metering device (iMG)
Communication System ( Data concentrator (DC) or| Gateway (GW))
Head End System (HES) through the respective test object (ToE or PG)
Our agile evaluation methodology is based on Common Criteria and strictly follows the latest version of “Die Prüfmetodologie zur Durchführung der Datensicherheitsprüfung für Smart Metering Komponentenin der Schweiz (Test Methodology for Execution of Data Security Evaluation of Swiss Smart Metering Components)” for METAS certification, issued by SWISSMIG.
Our Laboratory issues this Whitepaper as a brief summary. METAS provides a checklist and detailed information to the test process: https://www.metas.ch/metas/de/home/dl/datensicherheitspruefungen.html
Our Laboratory issues this Whitepaper as a brief summary. METAS provides a checklist and detailed information to the test process: https://www.metas.ch/metas/de/home/dl/datensicherheitspruefungen.html
Our Laboratory issues this Whitepaper as a brief summary. METAS provides a checklist and detailed information to the test process:
https://www.metas.ch/metas/de/home/dl/datensicherheitspruefungen.html
Sec. 2.1 Required documents describe which documents should you submit at the beginning of the test process.
The checklist is a requirement catalogue ("WHAT" column) that shall be fulfilled by the manufacturer ("HOW" and "WHERE") columns. "HOW" is an ADV_FSP-like description while the "WHERE" is an ADV_ARC-like description. In each HOW cell of the checklist the relevant OT tuples (“x”) from the OT matrix must be referenced (if any).
The RL-DSP-CH_A2_1045 is the recommended process for operating a whole smart meter system. It includes among others a theoretical explanation for the “5.1 Test field IT security concept” part of the Manufacturer document.
The requirements from chap. 5 of Annex 1 and the Prüfmethodologie chap. 7 are identical. Other parts of Annex 1 and Annex 2 basically contain requirements for the main components of an iMS.
The requirements are implemented by the architecture and functionality of the main components.
We will perform the testing procedure based on the requirements of the Prüfmethodologie from section 5.1 to 5.6. which refers to the OT matrix and the checklist.
Based on the Prüfmethodologie sec 5.2 which is about the checklist:
The Manufacturer:
The Evaluator:
The requirements of the Prüfmethodologie will also be examined during the documentation evaluation and the penetration test process according to the steps above.
DOES THE 5.1.4 (b) REQUIREMENT ONLY MEAN THAT DATA BETWEEN MAIN SYSTEM COMPONENTS (HAUPTKOMPONENTEN) NEED TO BE EXCHANGED IN ENCRYPTED WAY?
The requirement means that the assets need to be stored in encrypted format in the Smart Meter, furthermore the system must include a procedure for the secure, selective deletion of specific data. This procedure shall delete the data permanently, for example through overwriting with random data, therefore these specific data cannot be restored.
So, it is about secure storing and deleting, not exchanges.
The requirement means that the assets need to be stored in encrypted format in the Smart Meter, furthermore the system must include a procedure for the secure, selective deletion of specific data. This procedure shall delete the data permanently, for example through overwriting with random data, therefore these specific data cannot be restored.
So, it is about secure storing and deleting, not exchanges.
The “Vulnerable data” means the protected objects (assets or interfaces based on the SBA) in the test object that shall be protected (confidentiality, integrity and availability).
In this case, the key is also vulnerable data.
Swissmig created a Risk analysis document [Studie «Schutzbedarfsanalyse Smart Metering in der Schweiz»; 062016], which contains risk scenarios.
In this document, Swissmig determined the assets, the objects to be protected against threats. Prüfmethodologie's OT matrix summarizes this information.
This is a general requirement for all components, and it will be tested during the penetration test.
Usually, this process cannot be planned preliminary - a deep knowledge of the TOE is necessary.
To choose CCLab as Test Laboratory please enter the CCLab specific data to METAS Application form (Antragsformular):
There is a possibility to set up the HES in our laboratory. We can also test the HES with remote access.
First of all you deliver the test samples to our laboratory. We are responsible for the secure management of the test samples within the physical boundaries of the Laboratory. After the test process, we store the samples for at most one year for easier re-evaluation. After the one-year retention period, we send back the samples to you or take care of the secure disposal. Our price list contains the conditions of back delivery or secure disposal.
This can be certified within one evaluation process, but all the security relevant parts need to be tested separately. This may result in additional costs compared to a simple TOE evaluation process. If a configuration is not security relevant (e.g. color of the enclosure) no further tests are necessary. In the final test report, all possible configurations will be listed.