Last Updated 2022-02-18
The following documents explain the Scheme Document, Organization and Operational Manual, Requirements for the applicant, Guidance on application procedures and Operating procedures in this Scheme.
Document / Overview |
CCS-01 IT Security Evaluation and Certification Scheme Document ![]() Updated 2020-10-16
This Scheme Document prescribes "IT Security Evaluation and Certification Scheme" and basic matters related to this Scheme that need to be complied with by suppliers and users of IT products and systems as well as personnel engaged in the operation of this Scheme.
|
---|---|
Contents |
|
Document / Overview |
CCM-02 Updated 2020-10-16
The purpose of the Requirements is to prescribe the matters that applicants must comply with when making a certification application and maintain its certification.
|
---|---|
CCM-02-A Updated 2020-10-21
Forms for CCM-02-A can be obtained from "Forms to be downloaded (for Certification Application)."
This Guidance explains the necessary procedures that applicants conduct to acquire and maintain certification under IT Security Evaluation and Certification Scheme. |
|
Contents |
|
Document / Overview |
CCM-03 Updated 2020-10-30
The Requirements for Evaluation Facility prescribe the necessary matters for Evaluation Facilities to obtain approval from the Certification Body as well as the necessary matters for Evaluation Facilities that have obtained approval to maintain the approval under IT Security Evaluation and Certification Scheme.
|
---|---|
CCM-03-A Updated 2020-10-30
Forms and sample forms for CCM-03-A can be obtained from "Forms to be downloaded (for Evaluation Facility)."
This Guidance explains the procedures that Evaluation Facilities shall take to apply for obtaining approval and to maintain the approval under IT Security Evaluation and Certification Scheme. |
|
Contents |
|
Document / Overview |
CCM-01 Updated 2020-11-27
This Operational Manual prescribes policies and procedures for operating organization and certification services as the Certification Body under the IT Security Evaluation and Certification Scheme in accordance with ISO/IEC 17065 "Conformity assessment-Requirements for bodies certifying products, processes and services (JIS Q 17065)."
|
---|---|
Contents |
|
Document / Overview |
CCM-01-A Updated 2020-12-04
This Operating Procedure prescribes the necessary operating procedure for services of certification and ST confirmation as the Certification Body under the Japan IT Security Evaluation and Certification Scheme.
|
---|---|
Contents |
|
Document / Overview |
CCM-01-B Updated 2020-12-11
This Operating Procedure prescribes the necessary operating procedure to approve Evaluation Facilities and Evaluator Qualification as the Certification Body under the IT Security Evaluation and Certification Scheme.
|
---|---|
Contents |
|
Document / Overview |
CCM-01-C Updated 2020-12-11
This Operating Procedure prescribes the personnel and committees that are required for the operation of the IT Security Evaluation and Certification Scheme as the Certification Body.
|
---|---|
Contents |
|
The following procedures explain the items needed for the certification application. The applicants are required to understand and follow the notes and instructions below when submitting application forms.
For further inquiries on the Scheme Documentation, please contact to the following:
JISEC Administrative staff, IT Security Center,