{"id":5593,"date":"2024-11-30T18:50:25","date_gmt":"2024-11-30T17:50:25","guid":{"rendered":"https:\/\/src-gmbh.de\/portfolio\/themen\/evaluation-according-to-common-criteria\/"},"modified":"2025-02-14T20:11:14","modified_gmt":"2025-02-14T19:11:14","slug":"evaluation-according-to-common-criteria","status":"publish","type":"themen","link":"https:\/\/src-gmbh.de\/en\/portfolio\/topics\/evaluation-according-to-common-criteria\/","title":{"rendered":"Evaluation according to Common Criteria"},"content":{"rendered":"<div class=\"av-special-heading av-4u8d61-f3291ef256a302398efec9dff72aaf80 av-special-heading-h1 blockquote modern-quote avia-builder-el-2 el_before_av_heading avia-builder-el-first av-thin-font av-inherit-size\">\n<h2 class=\"av-special-heading-tag\"><strong>Common<\/strong> Criteria \u2013 The certification concept for the international comparability of IT security<\/h2>\n<p>They offer IT hardware or software with unique but complex security features. This is where their products differ from those of their competitors. At the same time, their customers expect internationally recognised, simple and comprehensible proof of the information technology security of their products. As providers, they want to differentiate themselves. Your customers expect standardisation. A dilemma.<\/p>\n<p>The Common Criteria for Information Technology Security Evaluation (also known as Common Criteria or CC for short) was established internationally in ISO\/IEC standard 15408.<\/p>\n<p><strong>CC certification follows a three-stage procedure:<\/strong><\/p>\n<ol>\n<li>Definition of the security target by the manufacturer<\/li>\n<li>Evaluation by a recognised testing laboratory<\/li>\n<li>Certification by the Federal Office for Information Security (BSI)<\/li>\n<\/ol>\n<p>Control over the functionality of the evaluated system and over the unique selling propositions remains consistently their responsibility as manufacturers. The separation of evaluation and certification ensures the dual control principle in the testing of the product. The resulting CC certification meets the highest internationally recognised standards.<\/p>\n<\/div>\n<div class=\"av-special-heading av-khdwp-2a6e8e5e6900b35a74662d0bf06b3fbf av-special-heading-h2 avia-builder-el-16 el_before_av_textblock avia-builder-el-first \">\n<h2 class=\"av-special-heading-tag\">Our offer<\/h2>\n<\/div>\n<section class=\"av_textblock_section av-wh1jux-2c5f99c26428069d46c7bf8f39fed6c8 \">\n<div class=\"avia_textblock\">\n<p class=\"bodytext\">SRC offers evaluations of all types of IT products, covering all test levels of the Common Criteria, including electronic ID cards and passports, smart metering systems, healthcare products, software, network devices, payment terminals, signature components, tachograph components and biometric systems.<br \/>\nIn addition, we offer manufacturers and users of IT security products consulting services relating to the Common Criteria. These include e.g.<\/p>\n<\/div>\n<\/section>\n<div class=\"avia-icon-list-container av-u98lxl-bc7ea95b80f3fe470025742c9855d10b avia-builder-el-18 el_after_av_textblock avia-builder-el-last \">\n<ul class=\"avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-big av-u98lxl-bc7ea95b80f3fe470025742c9855d10b avia-iconlist-animate avia_start_animation\">\n<li class=\"avia_start_animation\">\n<div class=\"iconlist_icon av-3uckjd-143424448dced32b474ca71da7dc0066 avia-font-entypo-fontello\">Common Criteria trainings<\/div>\n<article class=\"article-icon-entry av-iconlist-empty\">\n<footer class=\"entry-footer\"><\/footer>\n<\/article>\n<\/li>\n<li class=\"avia_start_animation\">\n<div class=\"iconlist_icon av-rixat5-402e670516fc404f8063e81ecde9abac avia-font-entypo-fontello\">Common Criteria-Workshops<\/div>\n<article class=\"article-icon-entry av-iconlist-empty\">\n<footer class=\"entry-footer\"><\/footer>\n<\/article>\n<\/li>\n<li class=\"avia_start_animation\">\n<div class=\"iconlist_icon av-mfdsft-b5f8cb998aae8e177b4a1d1d7e1a44be avia-font-entypo-fontello\">Creation of protection profiles<\/div>\n<article class=\"article-icon-entry av-iconlist-empty\">\n<footer class=\"entry-footer\"><\/footer>\n<\/article>\n<\/li>\n<li class=\"avia_start_animation\">\n<div class=\"iconlist_icon av-ohf989-b2d03aeaab8ae4b3ea3e09ba564b287d avia-font-entypo-fontello\">Definition der Sicherheitsziele<\/div>\n<article class=\"article-icon-entry av-iconlist-empty\">\n<footer class=\"entry-footer\"><\/footer>\n<\/article>\n<\/li>\n<li class=\"avia_start_animation\">\n<div class=\"iconlist_icon av-qatall-7be20f8ec8272bc77d518f302c5d36f7 avia-font-entypo-fontello\">Support with the compilation of the required manufacturer&#8217;s certificates<\/div>\n<\/li>\n<\/ul>\n<div class=\"av-special-heading av-32o4mh-45e3c4da3c18e1cbfa2b56184901acbc av-special-heading-h2 avia-builder-el-20 el_before_av_textblock avia-builder-el-first \">\n<h2 class=\"av-special-heading-tag\">Our recognition<\/h2>\n<\/div>\n<section class=\"av_textblock_section av-wh1jux-f93b113cb528cfdda0e9c79f1cc5a14c \">\n<div class=\"avia_textblock\">\n<p class=\"bodytext\">The Federal Office for Information Security (BSI) has approved SRC for the areas of<\/p>\n<ul class=\"avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-big av-u98lxl-ef28e030b8d78ee8b80926aac83e09f3 avia-iconlist-animate avia_start_animation\">\n<li class=\"avia_start_animation\">CC: Gemeinsame Kriterien<\/li>\n<li class=\"avia_start_animation\">SC: Technical domain &#8220;Smartcards and similar devices&#8221;<\/li>\n<li class=\"avia_start_animation\">HD: Technical domain &#8220;Hardware Devices with Security Boxes&#8221;<\/li>\n<\/ul>\n<p class=\"bodytext\"><span class=\"placeholder-inline-tasks\">recognized.<\/span><\/p>\n<\/div>\n<\/section>\n<\/div>\n","protected":false},"featured_media":5542,"template":"","themen_kategorien":[1810],"schlagworte":[1180,1393,1181,1390,1391,1182,1183,1392,1184],"class_list":["post-5593","themen","type-themen","status-publish","has-post-thumbnail","hentry","themen_kategorien-common-criteria-en","schlagworte-bsi-en","schlagworte-certification-concept","schlagworte-common-criteria-en","schlagworte-evaluation-en","schlagworte-international-standard-en","schlagworte-iso-15408-en","schlagworte-it-hardware-en","schlagworte-it-security-en","schlagworte-it-software-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/src-gmbh.de\/en\/wp-json\/wp\/v2\/themen\/5593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/src-gmbh.de\/en\/wp-json\/wp\/v2\/themen"}],"about":[{"href":"https:\/\/src-gmbh.de\/en\/wp-json\/wp\/v2\/types\/themen"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/src-gmbh.de\/en\/wp-json\/wp\/v2\/media\/5542"}],"wp:attachment":[{"href":"https:\/\/src-gmbh.de\/en\/wp-json\/wp\/v2\/media?parent=5593"}],"wp:term":[{"taxonomy":"themen_kategorien","embeddable":true,"href":"https:\/\/src-gmbh.de\/en\/wp-json\/wp\/v2\/themen_kategorien?post=5593"},{"taxonomy":"schlagworte","embeddable":true,"href":"https:\/\/src-gmbh.de\/en\/wp-json\/wp\/v2\/schlagworte?post=5593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}