Feb 1, 2019 - Yes. All ICT security products implementing cryptography destined for use by Australian Government agencies must use ACSC-approved cryptographic algorithms and ACSC-approved cryptographic protocols. Further information is in the ISM. .
Jul 1, 2018 - No. If requested, we can negotiate an NDA with the vendor. This can be a lengthy process that will postpone the start of the Cryptographic evaluation. To reduce delays, we have a standard NDA template, which is available upon request. .
Jul 1, 2018 - We administer the regulations for conducting Common Criteria (CC) evaluations. You can find more detail in the AISEP Policy Manual .