ITSC

Eurosmart’s feedback: Eurosmart welcomes the constant efforts of the European Commission and the European Cybersecurity Certification Group's (ECCG) on EUCC maintenance (EsEm) to update the EU Cybersecurity Common Criteria-based cybersecurity certification scheme (EUCC). While the proposal introduces some positive elements, we believe there are key areas...

Eurosmart's feedback on Evaluation of Regulation (EU) No 1025/2012 - European Standardisation Eurosmart, the leading association representing the digital security industry in Europe, welcomes the initiative based on the update of the European Standardisation Strategy to evaluate the Regulation (EU) No 1025/2012, especially in the light...

The digital landscape is constantly evolving, and with it, the regulatory frameworks designed to protect and enhance cybersecurity across Europe. The European Union has been at the forefront of developing comprehensive cybersecurity regulations to create a secure digital environment. Navigating this complex regulatory environment is critical...

Draft implementing regulation establishing the European cybersecurity certification scheme (EUCC) based on Common Criteria (CC) Eurosmart’s Comments Download Eurosmart's feedback Eurosmart and its members are delighted to be able to contribute to the implementation of the first European certification scheme. This initial scheme underscores the rigor and technical...

Public Consultation Eurosmart Technical group, ITSC, has developed  a Protection Profile for Secure Sub-System in System-on-Chip (3S in SOC) Modern System-on-Chip (SoC) products integrate more and more advanced functions, including security. Security Sub-System is also being integrated into the SoC (integrated Secure Element / eUICC). The target is...

Context The number of vulnerable devices on the market has resulted in an increased need for trust. Many new security standards, evaluations and certifications are flourishing, all with different levels of assurance. In this highly competitive market and fast-evolving security threats landscape, it is critical to...

download the document Document Overview: This document defines a series of additional elements of the security problem definition, security objectives, and security functional requirements (SFRs), to support those architectures of Security ICs according to [1] that use an external NVM for storage. This augmentation package provides guidelines...