Last Updated 2010-10-04
The purpose of the evaluation is to determine whether the TOE Security design is suitable, whether the TOE Security Functions fulfill the Security Requirements described on the TOE design and whether the TOE is developed based on the TOE design and free from exploitable vulnerabilities.
The following activities are included;
An applicant should submit Evaluation Deliverables in a timely manner to the Evaluation Facility concerned pursuant to the predetermined schedule of delivery.
Evaluation deliverables may include:
Items of hardware,
firmware or software which constitute
the TOE itself;
Items of hardware,
firmware or software which constitute
the TOE platform(s);
Supporting TOE documentation;
Guidance documentation;
Access to the development site;
Supporting Evaluator Test;
Technical support.
The Certified Body verifies the validity of the evaluation according to CC/CEM.