The Australian Information Security Evaluation Program (AISEP) evaluates and certifies products to provide a level of assurance in its security functionality in order to protect systems and data against cyber threats. These evaluation activities are certified by the Australian Certification Authority (ACA).
The Common Criteria
Information on what the Common Criteria is, and its guiding documentation, can be obtained from the Common Criteria website.
Certified Products
For a list of products certified via the AISEP, see the Certified Products List (CPL) on the Common Criteria website.
Certificates are withdrawn by the ACA if it is discovered that the products did not meet the criteria for which they were certified. Certificates withdrawn are listed below:
AISEP announcements
- January 2024
The ACA has updated its endorsed Protection Profiles and Protection Profiles under consideration lists. - October 2022
The ACA has completed a major revision and update of its AISEP Policy Manual (APM) which governs the operations and management of the AISEP. The revised APM is in-line with current practices and Common Criteria Recognition Arrangement (CCRA) requirements. The latest release of the APM is listed under the ‘AISEP policy and interpretations’ below.
- September 2022
The ACA has updated its endorsed Protection Profiles list and created a new list of Protection Profiles under consideration by the program.
- September 2021
The AISEP's program name has changed to 'Australian' from 'Australasian' to better reflect the status of the program that resides in Australia, and as a certificate authorising nation of the CCRA.
- July 2021
The ACA has endorsed the U.S Government Approved Protection Profile – PP-Module for Intrusion Prevention Systems (IPS) version 1.0 and added this document to the ACA-endorsed PP list below.
AISEP policy and interpretations
Sometimes an interpretation is required from the ACA for content within the AISEP Policy Manual or for product evaluation processes and procedures. The AISEP Policy Manual and current AISEP interpretations are listed below.
Australian Information Security Evaluation Facilities
An Australian Information Security Evaluation Facility (AISEF) is a commercial facility licensed by ASD, and accredited by the National Association of Testing Authorities, Australia (NATA), to conduct evaluations under the AISEP.
Teron Labs
Attention: Juan Gonzalez
Unit 3, 10 Geils Court
Deakin ACT 2600
Phone: +61 2 5114 4878
Email: juan@teronlabs.com
Web: https://www.teronlabs.com
Viden Labs
Attention: Anthony Barnes
Unit 63, Level 1, 10 Lonsdale St
Braddon ACT 2612
Email: anthony@viden.com
Web: https://www.viden.com
The following Australian Information Security Evaluation Facility is licensed to operate under the AISEP pending NATA 17025 accreditation.
Securus Consulting Group
Attention: Patrick Campbell-Dunn
Unit 4, 2 Brindabella Cct
Canberra Airport ACT 2609
Phone: +61 2 6189 4920
Email: aisef@securus-cg.com
Web: https://www.securus-cg.com
International partners
The Common Criteria Recognition Arrangement (CCRA) was established in 1998 in order for certification authorities to mutually recognise each other's certified products. Initially the CCRA was comprised of certification authorities from Canada, France, Germany, the United Kingdom and the United States. Australia and New Zealand joined the CCRA in 1999. A list of current participants can be found on the Common Criteria website.
Consumers can be confident that each participant of the CCRA ensures that evaluations are performed to a high and consistent standard. This eliminates the need for duplicating product evaluations within different countries.
Protection Profiles
A Protection Profile (PP) is a document stipulating the security functionality that must be included in a product. Organisations can have confidence that evaluations against PPs will cover the expected security functionality of a given product type and address known cyber threats.
In the past, evaluations were conducted at a specified Evaluation Assurance Level (EAL); however, PPs do not incorporate this scale. A cap of EAL 2 will apply to all EAL-based evaluations where a suitable PP does not yet exist. EAL-based evaluations will not be considered where a suitable PP already exists.
The ACA endorses all collaborative Protection Profiles that are listed on the Common Criteria website. In addition, the below table includes PPs that are also endorsed by the ACA for an evaluation within the AISEP.
Technology | Protection Profile | Version | Published |
---|---|---|---|
Network and Network-Related Devices and Systems | PP-Module for Virtual Private Network (VPN) Gateways (Mod_VPNGW_v1.3) | V1.3 | 2023-08-16 |
Network and Network-Related Devices and Systems | PP-Module for MACsec Ethernet Encryption | V1.0 | 2023-03-02 |
Network and Network-Related Devices and Systems | PP-Module for Intrusion Prevention Systems (Mod_IPS_v1.0) | V1.0 | 2021-05-11 |
Network and Network-Related Devices and Systems | Extended Package MACsec Ethernet Encryption (MACSEC EP) | V1.2 | 2016-05-10 |
The ACA follows the Transition End Date of NIAP-developed PPs as published on the NIAP’s website. During the transition window, products will be accepted into evaluation against the preceding version of the PP. All product evaluation submitted after the Transition End Date will only be accepted by the ACA for evaluation against the new version of NIAP-approved PP.
The below table includes PPs that are based on technologies that align with the Information Security Manual and are under consideration by the ACA as suitable for an evaluation within the AISEP.
Technology | Protection Profile | Version | Published |
---|---|---|---|
Application Software | Protection Profile for Application software | V1.4 | 2021-10-07 |
Certificate Authority | Protection Profile for Certification Authorities | V2.1 | 2017-12-01 |
Mobility | Protection Profile for Mobile Device Fundamentals | V3.3 | 2021-04-15 |
Network Encryption | Functional Package for TLS | V2.0 | 2019-02-12 |
Peripheral Switch | Protection Profile for Peripheral Sharing Device | V4.0 | 2019-07-19 |
Peripheral Switch | PP-Module for Analog Audio Output Devices | V1.0 | 2019-07-19 |
Peripheral Switch | PP-Module for Audio Input Devices | V1.0 | 2019-07-19 |
Peripheral Switch | PP-Module for Keyboard/Mouse Devices | V1.0 | 2019-07-19 |
Peripheral Switch | PP-Module for User Authentication Devices | V1.0 | 2019-07-19 |
Peripheral Switch | PP-Module for Video/Display Devices | V1.0 | 2019-07-19 |
Other PPs from the National Information Assurance Partnership may be considered on a case-by-case basis.
Purchasing evaluated products
Organisation looking to purchase products should make a decision as to whether they require independent assurance of a product's security features. If so, purchasers should examine the information available on the Certified Products List (such as the Security Target and Certification Report) for any product that they intend to purchase. On request, the ACA may be able to provide draft versions of the Security Target to potential Australian or New Zealand purchasers while the product is still in evaluation.
Of note, products where the vendor has an ongoing assurance continuity program involving discussion of changes with their certification authority (and conducting re-evaluation activities where necessary), or an evaluated flaw remediation process, will provide a much greater level of continuing assurance than those products that don't.
Products in evaluation
The following products are currently in evaluation within the AISEP.
Vendor | Product | Assurance Level | Acceptance Date | AISEF | Task ID |
---|---|---|---|---|---|
Advanced Design Technology (ADT) | ADT WASP KVM v1.0 | Protection Profile for Peripheral Sharing Device, Version 4.0, PP-Module for Video/Display Devices, Version 1.0, PP-Module for Keyboard/Mouse Devices, Version 1.0 | 29 September 2024 | Teron Labs | EFT-T052 |
Northrop Grumman Corporation | Ad Noctem Connect 1.0 | Protection Profile for Application Software, version 1.4, PP-Module for Virtual Private Network (VPN) Clients, version 2.4 | 1 July 2024 | Teron Labs | |
HPE Aruba Networking | HPE Aruba Networking Virtual Intranet Access client (VIA) | Protection Profile for Application Software, version 1.4, PP-Module for Virtual Private Network (VPN) Clients, version 2.4 | 1 July 2024 | Teron Labs | EFT-T050 |
HPE Aruba Networking | HPE Aruba Orchestrator and EdgeConnect | NDcPPv2.2e, PP-Module for VPN Gateways Version 1.3, PP-Module for Stateful Traffic Filter Firewalls, Version 1.4 | 13 June 2024 | Teron Lab | EFT-T049 |
Juniper Networks Inc | Juniper SSR software v6.3.1 on Juniper SSR120, SSR130, SSR1200, SSR1300, SSR1400 and SSR1500 | NDcPPv2.2e, PP-Module for Stateful Traffic Filter Firewalls, Version 1.4 | 13 June 2024 | Teron Lab | EFT-T048 |
Juniper Networks Inc | Juniper Junos OS 23.4R1 for SRX1600 | NDcPPv2.2e, PP-Module for VPN Gateways Version 1.3, PP-Module for Stateful Traffic Filter Firewalls, Version 1.4, PP-Module for Intrusion Prevention Systems (IPS), Version 1.0 | 8 May 2024 | Teron Labs | EFT-T046 |
Juniper Networks Inc | Junos OS Evolved 23.4 for PTX10001-36MR | NDcPPv2.2e, PP-Module for MACsec Ethernet Encryption Version: 1.0 | 6 May 2024 | Teron Labs | EFT-T045 |
Juniper Networks Inc | Junos OS 23.4R1 for MX10004 and MX10008 | NDcPPv2.2e, PP-Module for MACsec Ethernet Encryption Version: 1.0 | 12 Apr 2024 | Teron Labs | EFT-T044 |
Cogito Group | Jellyfish Leviathan CA 1.0 | CA_PPv2.1 | 21 Nov 2023 | Viden Labs | EFT-T002 |
EndaceProbe | EP-92C8-G4, EP-2184-G5 and EP-2144-G5 with Endace OSm v7.2 | NDcPPv2.2e | 18 Sep 2023 | Teron Labs | EFT-T043 |
Juniper Networks Inc | Junos OS 22.3R1 for QFX5200-32C, QFX5110-48S, QFX5110-32Q, QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, QFX5200-48Y and EX4650-48Y | NDcPPv2.2e | 01 Nov 2022 | Teron Labs | EFT-T033 |
Requesting a product evaluation
To request an EAL-based evaluation, please complete the sponsorship letter. We will work with you and the vendor to understand the evaluation aims, expectations and timeframes. Evaluations against an ACA endorsed PP does not require sponsorship.
Please note, vendors are not able to self-sponsor for AISEP evaluations. Also, while the sponsorship letter indicates consumer’s interest in the product, it does not obligate the purchase of the product by the sponsor after it has been certified.
Sponsorship Letter for AISEP Evaluation
Frequently asked questions
What is an AISEP Acceptance Package?
An AISEP Acceptance Package contains documents prepared by the developer and an Australian Information Security Facility. These include the Security Target and Protection Profile (if relevant) as well as any proposed timelines for the evaluation.
What is AISEP Assurance Continuity?
AISEP Assurance Continuity (AAC) is a process that allows a developer to request the extension of a certified product's assurance. In such cases, the product's developer is required to submit a proposal, known as an AAC maintenance task, to the ACA. This proposal contains an Impact Analysis Report (IAR). The ACA subsequently reviews the IAR to determine if the changes to the product are minor or major. Changes deemed as minor result in a maintenance update to the product's certification while changes deemed as major warrant re-evaluation of the product.
Contact us
If you have any other AISEP-related questions please contact the ACA at aca.certifications@defence.gov.au.