{"id":951,"date":"2024-02-05T22:11:26","date_gmt":"2024-02-05T21:11:26","guid":{"rendered":"https:\/\/webdev.atsec.us\/?page_id=951"},"modified":"2024-07-19T22:05:44","modified_gmt":"2024-07-19T20:05:44","slug":"common-criteria","status":"publish","type":"page","link":"https:\/\/webdev.atsec.us\/services\/certification\/common-criteria\/","title":{"rendered":"Common Criteria"},"content":{"rendered":"\n
\n
\n
\n
\n
\n

Certification<\/p>\n\n\n\n

Common Criteria<\/h1>\n\n\n\n

Consult our experts. We are happy to support you.<\/p>\n\n\n\n

\n
Contact Us<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
<\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/path><\/g><\/g>
\n
\n
\n
\n
\n
\n

The Common Criteria (CC), also known as ISO 15408, is an internationally recognized standard used to specify and assess the security of IT products. The CC does this by providing a set of general but rigorous functional and assurance criteria by which a product\u2019s security aspects can be evaluated using the evaluation methodology ISO 18045. This allows for an objective verification of the trustworthiness of a security product.
<\/p>\n\n\n\n

What atsec offers:<\/h3>\n\n\n\n

atsec Sweden operates a private Certification Body accredited by SWEDAC, Sweden\u2019s national accreditation body, against requirements specified in ISO\/IEC 17065. The current scope of accreditation for our Common Criteria Certification scheme is Common Criteria ISO 15408 and 18045, and we provide these services in conjunction with accredited 17025 laboratories.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n

\n
\n

More information:<\/h3>\n<\/div>\n\n\n\n
\n
\n

SWEDAC Listing<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n\n\n\n
\n

Complaints and Appeals<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n
\n

Why our services are important to you:<\/h3>\n\n\n\n

Certification done by a commercial Certification Body is often a faster and more flexible way of obtaining a certificate that meets the same high standards as certificates issued by government Certification Bodies.<\/p>\n<\/div>\n\n\n\n

\n
\n

Downloads:<\/h3>\n<\/div>\n\n\n\n
\n
\n

CC 2022 Transition Document<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n\n\n\n
\n

Developer Introducion to the Common Criteria<\/a><\/p>\n\n\n\n

\n
\u2192<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n
\n
\n
\n
\n

Ongoing certifications:<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
Certification ID<\/th>Product name<\/th>Applicant<\/th>Product type<\/th><\/tr><\/thead>
ATSEC-CC-001<\/td>F5 BIG-IP 17.1.0.1 APM<\/td>F5, Inc<\/td>Network Device<\/td><\/tr>
ATSEC-CC-002<\/td>F5 BIG-IP 17.1.0.1 AFM<\/td>F5, Inc<\/td>Network Device<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n\n\n\n
\n
\n
\n
\n
\n
\"\"<\/figure>\n\n\n\n
\n

Still have questions?<\/p>\n\n\n\n

Can’t find what you’re looking for? Let’s talk!<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n

\n
Contact Us \u2192<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n
\n
\n
\n

Common Criteria Evaluation<\/a><\/h3>\n\n\n\n

The Common Criteria (CC), also known as ISO 15408, is an internationally recognized standard used to specify and assess the security of IT products.<\/p>\n<\/div>\n\n\n\n

\n
Learn More<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n

Cryptographic Algorithm Testing<\/a><\/h3>\n\n\n\n

Testing that cryptographic algorithms are implemented correctly is a prerequisite for FIPS 140-3 cryptographic module testing and NIAP Common Criteria evaluations.<\/p>\n<\/div>\n\n\n\n

\n
Learn More<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n

Entropy Source Assessment<\/a><\/h3>\n\n\n\n

Documented conformance, where applicable, to the SP 800-90B is required by the CMVP for all FIPS 140-3 module validation submissions.<\/p>\n<\/div>\n\n\n\n

\n
Learn More<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
<\/div>\n\n\n\n
\n
\n

The Information Security Provider<\/p>\n\n\n\n

Read Our Latest Blog Articles<\/h2>\n\n\n\n

Learn the latest and greatest about information security. You\u2019ll find insights and analyses of recent developments in technology and policy on our blog.<\/p>\n<\/div>\n\n\n\n