3
min reading time
Online security has become a key factor when it comes to customer trust and conducting business online. The representatives of organizations, legal authorities and consumers can all become hesitant to make an electronic transaction if they don’t feel as if their data would be adequately secured.
Luckily, the European Union established the eIDAS regulation five years ago (in 2014), which has been a crucial constituent of the European Commission’s initiative to form Digital Single Market (DSM) for EU Member States.
To celebrate the 5th anniversary of this key development, on 01 July 2021, you will be able to virtually attend the go.eIDAS Summit 2021 that will cover topics like;
Before we get down to the details of the event, and show you how you can make sure your company complies with eIDAS regulations, let’s start at the beginning and explore what is eIDAS exactly.
What is eIDAS?
eiDAS stands for electronic IDentification, Authentication and trust Services that aims to make electronic transactions more secure and trustworthy within the territory of the Union. It offers a standardized approach and a common blueprint for secure electronic interactions, such as payments or administration, between private individuals, businesses and public authorities nationally and internationally alike. eIDAS aims to increase the efficacy of public and private online services, electronic business and e-commerce within the internal market of the EU.
Image source: https://www.leypal.com/en/blog-electronic-signature-eidas/
What kind of trust services does this regulation include?
What are the advantages of eIDAS?
The former eSignature Directive (Directive 1999/93/EC) had many defects, as being a 15-years-old directive at the time of the establishment of eIDAS, it wasn’t able to keep up with the fast-paced technological advancement, and lacked specific directives about the supervision of national and international ICTs.
To further secure online transactions and to assure private individuals, authorities and organizations about the security of online transactions, eIDAS bridges the gap between a fastly changing societal demand and institutionalized regulation by;
Join the go.eIDAS Summit 2021
The organizers of the Summit have assembled a team of leading international experts and stakeholders from 10 different EU Member States in the sector of secure digital identities, trust services and mobile government The representatives of Austria, Belgium, France, Estonia, Germany, Italy, Latvia, Luxembourg, Spain and last but not least, the Netherlands, will talk about their latest experiences, knowledge and ideas about the past, present, and future of eIDAS and EU’s cybersecurity landscape.
If you are interested in the latest security trends, register, and join this panel of experts on 01 July 2021!
How to comply with cross-border and national eIDAS standards?
The Commission Implementing Decision 2016/650 specifies the unavoidable security assessment standards of qualified signature and seal creation devices (QSCD). At the same time, it also lays down the thresholds for their certification, which official conformity assessment bodies use as the foundation for their consultation, and compliance assessment services.
As the assessment of compliance of the applying service providers, and their services is carried out by a certified conformity assessment body, organizations need to go under a thorough analysis, and consult with an eIDAS specialist in order to obtain the conformity assessment report that they can provide to the supervisory board.
CCLab, an accredited software security laboratory, provides full support to service providers in order to help them fulfill the requirements of eIDAS. Our organization have demonstrated history and experience in:
Our team of experts make sure your organization meets all necessary prerequisites to obtain the eIDAS certification by analyzing your company and services, providing professional consultation about the necessary modifications, executing the conformity assessment, and compiling the report required by the supervisory board.
Get your FREE A-Z supporting material for smart meter security standards. Learn more about the Swiss METAS data security evaluation projects of smart metering devices.
Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.
Read and learn more about the Radio Equipment Directive (RED), download our free material now.
The rapid evolution of emerging technologies is reshaping industries and introducing unprecedented levels of innovation. However, this technological advancement also brings new security risks, necessitating stringent compliance with internationally recognized standards. One such standard is Common Criteria (CC), a globally accepted framework for evaluating the security properties of IT products. While CC evaluation ensures a product meets rigorous security requirements, applying this framework to emerging technologies presents several challenges. This article will explore these challenges in detail and provide insights into overcoming them.
7
min reading time
Cloud computing offers unparalleled flexibility, allowing organizations to process vast amounts of data efficiently. However, security remains a major concern. Cloud security standards provide guidelines to secure cloud environments, while Common Criteria (CC) ensures IT products meet stringent security requirements. This article explores the role of cloud services in IoT, the associated security risks, and how aligning Common Criteria evaluation with cloud security standards enhances cybersecurity.
7
min reading time
As cyber threats become more sophisticated, businesses are compelled to implement rigorous protection strategies to stay compliant and secureCertification labs, like CCLab, play a crucial role in supporting businesses with expert testing, assessment and comprehensive compliance services, and specialized training. These labs offer services ranging from security audits to penetration testing, ensuring businesses remain resilient against evolving cyber threats while meeting regulatory standards. This article explores the indispensable role of certification labs, highlighting how they enhance cybersecurity, ensure compliance, and support a safer digital landscape.
9
min reading time