CISSP · · 4 min read

Evaluation Criteria and Security Certifications: Common Criteria, TCSEC, and How to Evaluate Product Security Claims

Certified secure means nothing without context. Learn Common Criteria, EAL ratings, and FIPS validation for informed security procurement decisions.

Hook / Why This Matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Vendors love claiming their products are "certified secure." But certified against what? At what assurance level? Understanding evaluation criteria is the difference between trusting a marketing badge and making an informed procurement decision. It is also a reliable CISSP exam topic that candidates often overlook.

Core Concept Explained Simply

Security evaluation criteria are standardized frameworks for assessing how secure a product or system actually is. They provide a common language for comparing products and a structured process for testing security claims.

TCSEC (The Orange Book)

The Trusted Computer System Evaluation Criteria was the original U.S. standard, published by the Department of Defense in 1983. It defined security levels from D (minimal protection) through A1 (verified design). TCSEC focused primarily on confidentiality and was designed for military classification systems.

TCSEC is historical context. It is no longer used for new evaluations, but the CISSP exam expects you to know it existed and what replaced it.

ITSEC

The Information Technology Security Evaluation Criteria was the European counterpart to TCSEC. It separated functionality from assurance, which was a significant improvement. ITSEC is also historical, replaced by Common Criteria.

Common Criteria (ISO 15408)

Common Criteria is the current international standard for security evaluation. It replaced both TCSEC and ITSEC and is recognized across 31 countries through the Common Criteria Recognition Arrangement.

The key components are:

Understanding EAL Ratings

EAL levels measure how thoroughly a product was tested and reviewed, not how many security features it has:

A product at EAL4 has been more rigorously evaluated than one at EAL2, but that does not mean it has more features or is "more secure" in absolute terms. A product with fewer features at a higher EAL may be more trustworthy than a feature-rich product at a lower EAL.

FIPS 140-2 and FIPS 140-3

These standards specifically validate cryptographic modules. If a product claims to use validated cryptography, FIPS 140 certification is the benchmark. It defines four security levels for cryptographic module implementation, from basic requirements (Level 1) to physical tamper-resistance (Level 4).

CISSP Lens

For the exam, focus on:

A common exam pattern presents a procurement scenario and asks about certification requirements. The correct answer usually involves specifying the right evaluation standard and understanding what the certification actually covers.

Real-World Scenario

A government agency requires Common Criteria EAL4+ for all firewall procurements. The procurement team finds a certified firewall on the Common Criteria portal. Before purchasing, the security architect reviews the Security Target document and discovers that the TOE covers only the packet filtering engine, not the VPN module or management interface.

This means the certification applies to one component of the firewall, not the entire product. The agency must either require separate certification for additional components, accept the risk for uncertified components, or implement additional controls to compensate.

This scenario illustrates why reading the Security Target is essential. A "Common Criteria certified" label on a product means far less without understanding what specifically was evaluated.

Common Mistakes and Misconceptions

Actionable Checklist

Key Takeaways

Exam-Style Reflection Question

A product is certified at Common Criteria EAL4. A competing product is certified at EAL2 but has more security features. Which provides greater assurance?

Answer: The EAL4 product provides greater assurance because EAL measures the rigor of evaluation and testing, not the number of features. EAL4 means methodically designed, tested, and reviewed. More features at a lower assurance level may actually introduce more risk if those features have not been as thoroughly evaluated.

Read next

© 2025 Threat On The Wire. All rights reserved.