Lightship Security Navigation
  • About
    • Story
    • Team
    • Partners
    • Testimonials
    • Jobs
  • Resources
    • Common Criteria
    • FIPS 140-3
  • Services
    • Common Criteria
    • FIPS 140-2/3
    • Security Consulting
    • Government Programs
  • Solutions
    • Test Utilities
    • Conformance Automation
  • Blog
  • Contact
    • Contact
    • Request a Quote
  • About
    • Story
    • Team
    • Partners
    • Testimonials
    • Jobs
  • Resources
    • Common Criteria
    • FIPS 140-3
  • Services
    • Common Criteria
    • FIPS 140-2/3
    • Security Consulting
    • Government Programs
  • Solutions
    • Test Utilities
    • Conformance Automation
  • Blog
  • Contact
    • Contact
    • Request a Quote

Tag Archive

Below you'll find a list of all posts that have been tagged as “Protection Profile”

SSH Rekey Limits with OpenSSH

Greg McLearn August 13, 2018Common Criteria

Since this article was posted, the international Network Interpretations Team has issued RFI 201824 stating that the send and receive keys can be independently rekeyed.  Therefore, the requirement that the ‘aggregate’ traffic be counted is no longer mandated according to …

Read More
Common CriteriaNDcPPProtection Profile

6 Tips to Help Avoid Surprises In Your Next Common Criteria Evaluation

Jason Lawlor July 29, 2018Certifications, Common Criteria

Undertaking a Common Criteria (CC) evaluation should not be an opaque process from a timing, process or cost perspective. In this post, the testing experts at Lightship provide 6 practical tips to ensure that you are getting the best value …

Read More
Common CriteriaProtection Profile

How to get on the NSA/NIAP Product Compliant List (PCL)

Lachlan Turner March 20, 2018Certifications, Common Criteria

Many vendors seeking to sell hardware or software to the U.S. Government, particularly to defense and intelligence agencies, will find that cyber security product certification is mandated by federal procurement requirements (CNSSP 11) for these environments. We know, because many …

Read More
NIAPPCLProtection Profile

eBook

Recent Posts

  • Key Update in NIAP Policy Letter #12: Vendors, Take Note of Core Functionality Requirement
  • Post-Quantum Crypto – FIPS Standards Announced
  • ESV for Common Criteria
  • EUCC Perspectives
  • What’s the Deal With NDcPP 3.0?
Copyright © Lightship Security. All rights reserved. | Privacy Policy | Website by Coracle Marketing