Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Common Criteria Overview

Common Criteria (CC) for information technology is an international agreement. Several countries have signed this agreement to assess the information technology products based on standardized criteria. In the Common Criteria Recognition Arrangement (CCRA), the participants have mutually agreed to recognize the product evaluations conducted in authorized laboratories in other countries. The authorized laboratories use a common methodology for information technology security evaluation.

CC Configuration Overview

CC configuration provides the steps required to duplicate the CC compliance evaluation configuration for your device with Junos OS. This is referred to as the evaluated configuration. This evaluated configuration ensures your device, sometimes referred as target of evaluation (TOE), adheres to the evaluation standards mentioned in Table 1.

Table 1: CC Evaluation Standards
Evaluation Standard Description

Network Device Collaborative Protection Profile (NDcPP) v2.2e—https://www.niap-ccevs.org/MMO/PP/CPP_ND_V2.2E.pdf

Provides the CC collaborative Protection Profile (cPP) to express the security functional requirements and security assurance requirements for a network device

Media Access Control Security (MACsec) Extended Package (EP) 1.0—https://www.niap-ccevs.org/MMO/PP/pp_ndcpp_macsec_ep_v1.0.pdf

Describes the security requirements for a network device that implement MACsec encryption to secure communications over a trusted channel

Figure 1 shows the workflow of CC configuration on your device:

Figure 1: CC Configuration Workflow CC Configuration Workflow

Supported Platform

This document evaluates the following platform for CC compliance:

For the details of Juniper Networks' certified products, see Compliance Advisor.