The ACSC has taken over maintenance of the Evaluated Products List (EPL) from ASD.
The EPL is a list of ICT security products evaluated by ACSC, and previously the ASD, for use in Australian and New Zealand government agencies.
- Evaluated Products on the EPL may be used to build secure systems and networks as described in the Australian Government Information Security Manual (ISM).
- Products listed here have undergone one or more of ASD's evaluation programs and are listed according to the highest assurance to which they have been evaluated.
- Additional products listed on the Common Criteria Portal's Certified Products list are considered Evaluated Products for purposes of the ISM.The Common Criteria Mutual Recognition Arrangement means these products are recognised at the EAL2 level, or against the relevant appropriate Protection Profiles of their evaluation.These products do not need to be dual-listed on the EPL.
- Users of the EPL should ensure that their intended use of a product is consistent with the documentation provided on the product's EPL (or Common Criteria Portal) entry.
Aug 14, 2018 - Australian and New Zealand government agencies can ask us to evaluate an ICT product (hardware or software) for evaluation up to EAL2 where we haven't yet approved a Protection Profile for the relevant technology. To request an evaluation, fill out the following template and email it to us at email@example.com.
Aug 14, 2018 - Only Australian and New Zealand government agencies can ask us to evaluate an ICT product. If you are an industry consultant or a product developer and your product evaluated, use the checklist listed here.
Jul 10, 2018 - We undertake formal independent assessment of ICT security products (both hardware and software) to make sure they meet our standards.
Jul 10, 2018 - The Australasian Information Security Evaluation Program (AISEP) evaluates and certifies ICT products for use in Australian and New Zealand government agencies to protect official information and communications systems. The results of successful evaluations are published on the Evaluated Products List (EPL) and the internationally-recognised Common Criteria (CC) Portal.
Jul 1, 2018 - Common Criteria Recognition Arrangement (CCRA) participating nations do not duplicate the publication of mutually-recognised certified products on each of their certified products lists (for the AISEP, this is the EPL). In accordance with the CCRA, certificates published on the CC Portal that are EAL 1 through 2 are instantly mutually recognised by Australia and New Zealand and, therefore, the Evaluated Products List (EPL) is not required to repeat published evaluations and certifications.
Jul 1, 2018 - The Australian Government Information Security Manual (ISM) provides policies and guidance on security controls to Australian Government agencies on how to protect their ICT systems. It provides guidance on selecting ICT security products from the EPL.
Jul 1, 2018 - The Evaluated Products List (EPL) serves two purposes: It fulfils the AISEP's requirement of the CCRA to publish a list of AISEP-certified products It provides a comprehensive list of ACSC-evaluated ICT security products that meet the needs of Australian and New Zealand government agencies in securing official resources in accordance with the Information Security Manual (ISM). The EPL publishes:
Jul 1, 2018 - If you are an industry consultant or a product developer and would like your product evaluated, use the following checklist: Step 1 Conduct background research on government agency security needs through the Australian Government Information Security Manual (ISM) and/or the NZ ISM
Jul 1, 2018 - You can submit a letter of recommendation for evaluation up to EAL2 where there isnt yet an ACSC-approved Protection Profile for the relevant technology. Submit your evaluation request using this letter of recommendation for evaluation template. The letter of recommendation for evaluation serves three main purposes: It provides a record and helps with tracking. It helps us communicate with you during the evaluation. It provides us with details on how you intend to use the product so we can ensure the scope of evaluation is appropriate.
Jul 1, 2018 - A Protection Profile is a document that stipulates the security functionality that must be included in a Common Criteria evaluation. Agencies can have confidence that the scope of an evaluation against an ACSC-approved Protection Profile covers the necessary security functionality expected of the evaluated product and known security threats will have been addressed. The evaluation scope also includes the effectiveness and integrity of cryptographic functions.