Certification

Common Criteria

Consult our experts. We are happy to support you.

The Common Criteria (CC), also known as ISO 15408, is an internationally recognized standard used to specify and assess the security of IT products. The CC does this by providing a set of general but rigorous functional and assurance criteria by which a product’s security aspects can be evaluated using the evaluation methodology ISO 18045. This allows for an objective verification of the trustworthiness of a security product.

What atsec offers:

atsec Sweden operates a private Certification Body accredited by SWEDAC, Sweden’s national accreditation body, against requirements specified in ISO/IEC 17065. The current scope of accreditation for our Common Criteria Certification scheme is Common Criteria ISO 15408 and 18045, and we provide these services in conjunction with accredited 17025 laboratories.

Why our services are important to you:

Certification done by a commercial Certification Body is often a faster and more flexible way of obtaining a certificate that meets the same high standards as certificates issued by government Certification Bodies.

Ongoing certifications:

Certification ID Product name Applicant Product type
ATSEC-CC-001 F5 BIG-IP 17.1.0.1 APM F5, Inc Network Device
ATSEC-CC-002 F5 BIG-IP 17.1.0.1 AFM F5, Inc Network Device

Still have questions?

Can’t find what you’re looking for? Let’s talk!

Common Criteria Evaluation

The Common Criteria (CC), also known as ISO 15408, is an internationally recognized standard used to specify and assess the security of IT products.

Cryptographic Algorithm Testing

Testing that cryptographic algorithms are implemented correctly is a prerequisite for FIPS 140-3 cryptographic module testing and NIAP Common Criteria evaluations.

Entropy Source Assessment

Documented conformance, where applicable, to the SP 800-90B is required by the CMVP for all FIPS 140-3 module validation submissions.

The Information Security Provider

Read Our Latest Blog Articles

Learn the latest and greatest about information security. You’ll find insights and analyses of recent developments in technology and policy on our blog.