Enhancing information security

JISEC-Scheme Documentation [Basics]

Last Updated:Feb 18, 2022

Scheme documentation is regularly revised by JISEC.
Note that the latest versions of the forms should be used (CCM-02-A, CCM-03-A).
It is important to understand the contents of the latest Scheme documentation for your application procedures.

IT Security Evaluation and Certification Scheme Documentation

The following documents explain the Scheme Document, Organization and Operational Manual, Requirements for the applicant, Guidance on application procedures and Operating procedures in this Scheme.

For all relevant parties under this Scheme

Document / Overview
  • CCS-01
  • This Scheme Document prescribes "IT Security Evaluation and Certification Scheme" and basic matters related to this Scheme that need to be complied with by suppliers and users of IT products and systems as well as personnel engaged in the operation of this Scheme.
  • Purpose of the Scheme
  • Definition of Terms
  • Structure of the Scheme
  • Overview of Evaluation and Certification
  • Overview of Evaluation and ST Confirmation
  • Rights and Obligations of Applicants
  • Suspension or Revocation of Certification and ST Confirmation
  • Miscellaneous Provisions

For applicants, Evaluation Facility

Document / Overview
  • Certification Application Preparations
  • Procedures for a Certification Application and Corrections during Application
  • Overview of Evaluation and Certification
  • Assurance Continuity
  • Suspensions and Revocations of Certification
  • Miscellaneous Procedures after Acquiring Certification
  • Succession of Certification
  • Handling Complaints about a Certified Product
  • Use for the "Certification Mark"

For Evaluation Facility

Document / Overview
  • CCM-03(PDF:262 KB)
    • Updated 2020-10-30
    • The Requirements for Evaluation Facility prescribe the necessary matters for Evaluation Facilities to obtain approval from the Certification Body as well as the necessary matters for Evaluation Facilities that have obtained approval to maintain the approval under IT Security Evaluation and Certification Scheme.
  • CCM-03-A
  • Approval of Evaluation Facility
  • Approval of Evaluator Qualification

For Certification Body

Document / Overview
  • CCM-01
    • Organization and Operational Manual for IT Security Certification Body(PDF:265 KB)
    • Updated 2020-11-27
    • This Operational Manual prescribes policies and procedures for operating organization and certification services as the Certification Body under the IT Security Evaluation and Certification Scheme in accordance with ISO/IEC 17065 "Conformity assessment-Requirements for bodies certifying products, processes and services (JIS Q 17065)."
  • Matters that Need to be Complied with by Personnel Engaged in the Operation of Certification Services
  • Advisory boards for the operation of certification services (Management Committee, Technical Committee, Certification Committee, and Hardware Certification Committee)
  • Certification Services
  • ST Confirmation Services
  • Internal Audit
Document / Overview
  • Handling services for Reception and Acceptance of Certification Application / Certification / Assurance Continuity / Changing Records
  • Suspension or Revocation of Certification and ST Confirmation
  • Preparation and Publication of Standards and Guidance, etc.
  • Internal Audit / Document Management
Document / Overview
  • Operating Procedure for Reception and Acceptance of Application
  • Operating Procedure for Approval of Evaluator Qualification and Changes
  • Operating Procedure for Approval of IT Security Evaluation Facility and Changes
Document / Overview
  • Appointment of a Technical Manager, etc.
  • Qualification Standards, Procedure for Registration, Management, Education and Training Programs of Certifiers, and Committees

Procedures for Certification Application and Relevant Documents

The following procedures explain the items needed for the certification application. The applicants are required to understand and follow the notes and instructions below when submitting application forms.

Contact information

For further inquiries on the Scheme Documentation, please contact to the following:

JISEC Administrative staff, IT Security Center,
Information-technology Promotion Agency, Japan

  • TEL


  • FAX


  • E-mail