Last Updated 2010-10-04
This page offers you information to understand the outline of the workflow of IT Security Evaluation and Certification.
The working processes of IT Security Evaluation and Certification consist of the following four steps.
1 Preparation Step: | Necessary preparations for submitting an application for Evaluation and Certification | |
2 Evaluation Work Step: | Examination of the evaluation deliverables followed CEM. | |
3 Certification Work Step: | Review of adequacy of the evaluation. | |
4 Publication Step: | Publication on the JISEC Web. |
To apply the certification, the applicant should be clarifying the purpose and the range of evaluation beforehand. If it is not considered enough, unnecessary expense and the man-hour are spent in the course of the evaluation and the certification.