
EUCC Certification Scheme
What is EUCC Certification Scheme?
The EU Common Criteria Certification (EUCC) scheme, established under the products, services, and processes across the European Union. This scheme is based on Common Criteria (ISO/IEC 15408) and Common Evaluation Methodology (ISO/IEC 18045) and ensures robust security, fosters trust, and facilitates the free movement of certified products within the EU.
DEKRA is a Conformity Assessment Body (CAB) consisting in an accredited Certification Body (CB) and Information Technology Security Evaluation Facility (ITSEF) operating under the EUCC scheme at substantial assurance level.
Our Services
The EUCC CAB provides certification for ICT products under the EUCC scheme, covering a wide range of products such as software, network devices, smart cards, and hardware devices. Focused on a "Substantial level" (AVA_VAN.3) of security, DEKRA offers the following services:
The certification activity is divided in several phases:
This part of the service ensures the continuity and the review of EUCC certificates. The certification activities are divided in two branches: Review of an EUCC certificate and suspension, re-activation, withdrawal and expiry of EUCC certificates.
Review of an EUCC certificate:
- Renewal
- Re-assessment
- Maintenance
- Patch Management
When one of these actions are selected, the standard certification process is followed as described in the previous section (KO Meeting, Evaluation, Coordination, Finalization).
The status of a certificate can be:
- IN-FORCE (ACTIVE)
- SUSPENDED
- WITHDRAWN
- EXPIRED
If the certificate has been suspended, it can be re-activated with an approved remedial action within a 30-day period.
This activity is an ongoing surveillance process. The objective is to identify potential issues of non-compliance or changes in the security requirements of the ICT product that might require further investigation or action, such as initiating an assurance continuity procedure.
EUCC monitoring activities conducted by the CB fall into two categories:
- General Monitoring: Focuses on holder compliance and product conformity. Sources for this monitoring include applicant commitments, information from other authorities, complaints, and vulnerability information.
- ITSEFs Monitoring: ITSEFs Monitoring focuses on the performance of ITSEFs included in the CB's list of accepted entities for evaluation outsourcing.
As a result of the surveillance activity carried out by the CB, the following could occur:
- Consequences of non-compliance by the holder of the certificate related to a certified product.
- Consequences of non-conformity of a certified ICT product.
- Consequences of non-compliance by the conformity assessment body.
Non-conformities or non-compliances may lead to the suspension or withdrawal of the certificate.
The EUCC activities required for the CB are the following, in case it receives a Vulnerability impact analysis report from the holder of a certified product certified by the CB:
- Vulnerability management: These activities cover the activities to be performed by the CB in the event of reception of a vulnerability impact analysis report of a EUCC certified product. This procedure addresses the activities to be performed by the CB when a vulnerability impact analysis report of a EUCC certified product is received.
- Vulnerability disclosure: These activities cover the activities to be performed by the CB. This procedure describes the process for the disclosure of vulnerabilities information upon withdrawal of an EUCC certificate.
In addition to initial certification, DEKRA offers full coverage of the certification lifecycle including certificate’s maintenance and monitoring services (each 2 years), which help to maintain the validity of the certificate throughout the product lifecycle. These services include re-assessment, maintenance, patch management, and certificate review.

Whilst DEKRA has its own laboratory to perform the evaluation activity, this labor can be externalized to another laboratory through legally binding agreements. Subcontractors (ITSEFs), must be independent, ISO/IEC 17025 accredited, and adhere to EUCC requirement. The CB oversees subcontractor activities via a Technical Manager, who monitors qualifications, collects records of assessments, addresses non-conformities, and ensures compliance with operational procedures.

Common Criteria ISO/IEC 15408
Common Criteria is a Certification Framework to evaluate and certify cybersecurity requirements in IT products.
Details

Cloud Application Security Assessment
Ensure your data security with CASA, preventing threats and increasing consumer trust.
Details

FIPS 140-3 Certification
At DEKRA, we guide our customers through the FIPS 140-3 certification process, performing validation testing and providing timely and professional support.
Details

ISO/IEC 19790
DEKRA's private certification scheme provides a framework for certifying cryptographic modules, offering transparency to users and stakeholders.
Details

eIDAS 2.0
We help trust service providers and organizations comply with eIDAS 2.0 Regulation through expert audit services that strengthen digital identity security.
Details

LINCE-Certification
Qualify your ICT products with LINCE certification for inclusion in the Spanish CPSTIC product catalogue and comply with national IT security requirements.
Details

Cybersecurity Testing & Certification
Cybersecurity Evaluations and Certifications for a Safe, Secure and Reliable Future.
Details

