
1
min reading time
The new PP was developed and published in November 2019 by Ad-Hoc Group Privacy & Security of the CEN/CENELEC/ETSI Coordination Group on Smart Meters.
The latest PP document is available on the Common Criteria Portal.
As the number of IoT and specifically smart metering products have been increasing recently all over the world, it will be a great help for factories, producers and also for clients who intend to use these kinds of products in the future. The PP includes a detailed description of all the minimum security requirements which should be met by any smart metering product available on the market.
Why do we like it so much?
CCLAB has great experience in CC evaluations and smart metering devices.
With the clear Protection Profile CCLAB will keep on providing the most effective and shortest possible evaluation projects on the highest professional level for its clients.


Get your FREE A-Z supporting material for smart meter security standards. Learn more about the Swiss METAS data security evaluation projects of smart metering devices.


This downloadable infographics introduces you to the Swiss Smart Metering data security pre-assessment process of METAS certification.


This downloadable infographics introduces you to Swiss Smart Metering data security evaluation process of METAS certification.

Legacy systems power critical operations across industries worldwide, yet they present unique challenges when organizations pursue Common Criteria certification. The clock is ticking for manufacturers and enterprises who must navigate complex compliance requirements while maintaining operational continuity. Organizations pursuing Common Criteria certification must address unique challenges when dealing with legacy infrastructure, but with the right approach, success is achievable. The urgency cannot be overstated. Regulatory deadlines approach rapidly, and the cost of non-compliance continues to escalate. Legacy systems that once served as reliable workhorses now require strategic transformation to meet modern security standards. This guide provides actionable strategies to prepare your legacy infrastructure for certification success.
10
min reading time

The European Union has launched an ambitious digital transformation initiative centered on digital identity and trust services. Building upon the foundation of the original eIDAS Regulation (Regulation (EU) No. 910/2014), the updated eIDAS 2.0 framework (Regulation (EU) 2024/1183) establishes a European Digital Identity (EUDI) Framework that requires all Member States to make interoperable EU Digital Identity Wallets available to citizens and businesses by 2026. This effort aims to create consistency in legal certainty, interoperability, and data protection across borders, strengthening trust in Europe’s digital landscape.
9
min reading time

The journey of achieving Common Criteria certification represents just the beginning of a complex, ongoing process that demands continuous attention and strategic management. Organizations worldwide invest significant resources in obtaining these prestigious security certifications, yet many underestimate the critical importance of proper lifecycle management once their products become Common Criteria certified. Effective CC certification lifecycle management ensures continuous security assurance, regulatory compliance, and market credibility throughout a product’s operational lifespan.
9
min reading time