The Australian Information Security Evaluation Program (AISEP) evaluates and certifies products to provide a level of assurance in its security functionality in order to protect systems and data against cyber threats. These evaluation activities are certified by the Australian Certification Authority (ACA).
The Common Criteria
For a list of products certified via the AISEP, see the Certified Products List (CPL) on the Common Criteria website.
Certificates are withdrawn by the ACA if it is discovered that the products did not meet the criteria for which they were certified. Certificates withdrawn are listed below:
- October 2022
The ACA has completed a major revision and update of its AISEP Policy Manual (APM) which governs the operations and management of the AISEP. The revised APM is in-line with current practices and Common Criteria Recognition Arrangement (CCRA) requirements. The latest release of the APM is listed under the ‘AISEP policy and interpretations’ below.
- September 2022
The ACA has updated its endorsed Protection Profiles list and created a new list of Protection Profiles under consideration by the program.
- September 2021
The AISEP's program name has changed to 'Australian' from 'Australasian' to better reflect the status of the program that resides in Australia, and as a certificate authorising nation of the CCRA.
- July 2021
The ACA has endorsed the U.S Government Approved Protection Profile – PP-Module for Intrusion Prevention Systems (IPS) version 1.0 and added this document to the ACA-endorsed PP list below.
AISEP policy and interpretations
Sometimes an interpretation is required from the ACA for content within the AISEP Policy Manual or for product evaluation processes and procedures. The AISEP Policy Manual and current AISEP interpretations are listed below.
Australian Information Security Evaluation Facilities
An Australian Information Security Evaluation Facility (AISEF) is a commercial facility licensed by ASD, and accredited by the National Association of Testing Authorities, Australia (NATA), to conduct evaluations under the AISEP.
The following Australian Information Security Evaluation Facility is licensed to operate under the AISEP pending NATA 17025 accreditation.
The Common Criteria Recognition Arrangement (CCRA) was established in 1998 in order for certification authorities to mutually recognise each other's certified products. Initially the CCRA was comprised of certification authorities from Canada, France, Germany, the United Kingdom and the United States. Australia and New Zealand joined the CCRA in 1999. A list of current participants can be found on the Common Criteria website.
Consumers can be confident that each participant of the CCRA ensures that evaluations are performed to a high and consistent standard. This eliminates the need for duplicating product evaluations within different countries.
A Protection Profile (PP) is a document stipulating the security functionality that must be included in a product. Organisations can have confidence that evaluations against PPs will cover the expected security functionality of a given product type and address known cyber threats.
In the past, evaluations were conducted at a specified Evaluation Assurance Level (EAL); however, PPs do not incorporate this scale. A cap of EAL 2 will apply to all EAL-based evaluations where a suitable PP does not yet exist. EAL-based evaluations will not be considered where a suitable PP already exists.
The ACA endorses all collaborative Protection Profiles that are listed on the Common Criteria website. In addition, the below table includes PPs that are also endorsed by the ACA for an evaluation within the AISEP.
|Network and Network-Related Devices and Systems||PP-Module for Intrusion Prevention Systems (Mod_IPS_v1.0)||V1.0||2021-05-11|
|Network and Network-Related Devices and Systems||PP-Module for Virtual Private Network (VPN) Gateways (Mod_VPNGW_v1.2)||V1.2||2022-03-31|
|Network and Network-Related Devices and Systems||PP-Module for Virtual Private Network (VPN) Gateways (Mod_VPNGW_v1.1)||V1.1||2020-07-01|
|Network and Network-Related Devices and Systems||Extended Package MACsec Ethernet Encryption (MACSEC EP)||V1.2||2016-05-10|
The below table includes PPs that are based on technologies that align with the Information Security Manual and are under consideration by the ACA as suitable for an evaluation within the AISEP.
|Application Software||Protection Profile for Application software Version 1.4||V1.4||2021-10-07|
|Certificate Authority||Protection Profile for Certification Authorities Version 2.1||V2.1||2017-12-01|
|Mobility||Protection Profile for Mobile Device Fundamentals Version 3.2||V3.2||2021-04-15|
|Network Encryption||Functional Package for TLS V1.1||V1.1||2019-02-12|
|Peripheral Switch||Protection Profile for Peripheral Sharing Device Version 4.0||V4.0||2019-07-19|
|Peripheral Switch||PP-Module for Analog Audio Output Devices Version 1.0||V1.0||2019-07-19|
|Peripheral Switch||PP-Module for Audio Input Devices Version 1.0||V1.0||2019-07-19|
|Peripheral Switch||PP-Module for Keyboard/Mouse Devices Version 1.0||V1.0||2019-07-19|
|Peripheral Switch||PP-Module for User Authentication Devices Version 1.0||V1.0||2019-07-19|
|Peripheral Switch||PP-Module for Video/Display Devices Version 1.0||V1.0||2019-07-19|
|Key Management Systems||PP-Module for Encryption Key Management components||V1.0|
|Network and Network-Related Devices and Systems||PP-Module for MACsec Ethernet Encryption||V1.0|
Other PPs from the National Information Assurance Partnership may be considered on a case-by-case basis.
Purchasing evaluated products
Organisation looking to purchase products should make a decision as to whether they require independent assurance of a product's security features. If so, purchasers should examine the information available on the Certified Products List (such as the Security Target and Certification Report) for any product that they intend to purchase. On request, the ACA may be able to provide draft versions of the Security Target to potential Australian or New Zealand purchasers while the product is still in evaluation.
Of note, products where the vendor has an ongoing assurance continuity program involving discussion of changes with their certification authority (and conducting re-evaluation activities where necessary), or an evaluated flaw remediation process, will provide a much greater level of continuing assurance than those products that don't.
Products in evaluation
The following products are currently in evaluation within the AISEP.
Requesting a product evaluation
To request an EAL-based evaluation, please complete the sponsorship letter. We will work with you and the vendor to understand the evaluation aims, expectations and timeframes. Evaluations against an ACA endorsed PP does not require sponsorship.
Please note, vendors are not able to self-sponsor for AISEP evaluations. Also, while the sponsorship letter indicates consumer’s interest in the product, it does not obligate the purchase of the product by the sponsor after it has been certified.
Frequently asked questions
What is an AISEP Acceptance Package?
An AISEP Acceptance Package contains documents prepared by the developer and an Australian Information Security Facility. These include the Security Target and Protection Profile (if relevant) as well as any proposed timelines for the evaluation.
What is AISEP Assurance Continuity?
AISEP Assurance Continuity (AAC) is a process that allows a developer to request the extension of a certified product's assurance. In such cases, the product's developer is required to submit a proposal, known as an AAC maintenance task, to the ACA. This proposal contains an Impact Analysis Report (IAR). The ACA subsequently reviews the IAR to determine if the changes to the product are minor or major. Changes deemed as minor result in a maintenance update to the product's cetification while changes deemed as major warrant re-evaluation of the product.
If you have any other AISEP-related questions please contact the ACA at firstname.lastname@example.org.