Implementing EUCC: What High-Assurance Certification Requires Beyond Traditional Common Criteria Approaches


High-assurance certification for cybersecurity products in Europe has entered a new era with the adoption of the European Common Criteria-based cybersecurity certification scheme (EUCC). Formally adopted by the European Union Agency for Cybersecurity (ENISA) in early 2024, the EUCC builds upon the time-proven SOG-IS Common Criteria evaluation framework already utilized across 17 EU Member States.

The scheme represents a significant evolution in the EU's approach to cybersecurity compliance, forming part of a broader legislative effort that aligns with the NIS2 Directive and the Cyber Resilience Act. Importantly, the EUCC introduces two distinct levels of assurance based on the level of risk associated with the intended use of products, services, or processes. As highlighted in our previous overview of Common Criteria assurance levels and methodology, understanding these tiers is fundamental to navigating the evaluation process. Furthermore, certifications under this new framework are valid for up to five years, though updates are required when changes occur in the certified product. The European Cybersecurity Certification Group will play an essential role in maintaining this scheme, ensuring its continued relevance and effectiveness. Additionally, as organizations prepare to navigate these new requirements, understanding how the EUCC differs from traditional Common Criteria approaches becomes crucial for achieving compliance and enhancing security posture.

Understanding the Shift: From Traditional CC to EUCC

The European cybersecurity landscape has historically been characterized by fragmentation, with different countries operating their own certification schemes and standards. This patchwork approach created significant challenges for manufacturers and consumers alike, necessitating a more unified framework.

Why EUCC was introduced

The European Union Cybersecurity Certification (EUCC) emerged primarily in response to escalating cybersecurity threats and the inadequacies of a fragmented certification landscape within the EU. Before the EUCC, various European countries operated with their own Common Criteria evaluation certification schemes under SOG-IS, creating barriers for businesses operating in multiple countries. The scheme was conceived under the Cybersecurity Act of 2019 to establish a comprehensive and unified framework that enhances cybersecurity standards, creates a safer digital environment, and facilitates smoother trade across the European Union.

Limitations of traditional Common Criteria

Historically, Common Criteria (CC) was designed for a "shrink-wrapped" world where security was evaluated against a static version of a physical or digital product. As technology shifted toward the cloud, several structural "gaps" in the traditional CC framework became apparent. Here is why those limitations existed and how the industry is currently trying to fix them:

The "Point-in-Time" vs. Continuous Delivery Gap:

Systemic and Market Challenges

Beyond the technical mismatch with the cloud, the traditional framework faced several other critical limitations:

How EUCC aligns with the Cybersecurity Act

The EUCC represents the first certification scheme developed under the Cybersecurity Act certification framework. It harmonizes certification across Europe, ensuring that all ICT products and services meet a unified security benchmark. Essentially, the scheme serves as the vehicle to convey requirements from EU policy level to industrial service provision and further to users and conformity assessment bodies.

The scheme introduces two levels of assurance based on the level of risk associated with the intended use: "substantial" (covering EAL1 to EAL3) and "high" (covering EAL4 to EAL7). This risk-based approach aligns perfectly with the Cybersecurity Act's goal of establishing appropriate levels of assurance for different scenarios. By implementing this harmonized approach, the EUCC eliminates previous inconsistencies, simplifies the regulatory environment for manufacturers, and enhances consumer trust in the security of ICT products.

Breaking Down the Assurance Levels

Common Criteria Assurance Levels

The EUCC framework establishes a clear two-tier structure for assurance certification that directly maps to existing Common Criteria evaluation methodologies while introducing important distinctions in approach. This mapping creates a straightforward pathway for manufacturers already familiar with traditional CC processes.

Substantial assurance: EAL1 to EAL3

The substantial assurance level corresponds to the lower Evaluation Assurance Levels (EAL1 through EAL3) and specifically encompasses vulnerability assessment components AVA_VAN.1 and AVA_VAN.2. At this level, evaluations focus on basic security vulnerability identification through straightforward examination and testing. Specifically, the assessment aims to confirm "the absence of publicly known vulnerabilities" and verify that security functionalities are correctly implemented. This level is intended to minimize “known cybersecurity risks, and the risk of incidents and cyberattacks carried out by actors with limited skills and resources".

High assurance: EAL4 to EAL7

Conversely, the high assurance level corresponds to EAL4 through EAL7, requiring more rigorous vulnerability assessments classified as AVA_VAN.3, AVA_VAN.4, or AVA_VAN.5. This level mandates comprehensive testing methodologies to identify potential vulnerabilities and verify the product's security robustness against state-of-the-art cyberattacks carried out by actors with significant skills and resources. Notably, certification at AVA_VAN.4 and AVA_VAN.5 is reserved for scenarios requiring the highest assurance due to the critical nature of the ICT products. The evaluation activities include reviewing for absence of known vulnerabilities, testing security functionalities, and assessing resistance to skilled attackers through penetration testing.

Dynamic risk-based evaluation under EUCC

Unlike the more static approach of traditional Common Criteria, a shift we recently explored in our guide on what you need to know about security certification in 2025, the EUCC emphasizes current risk contexts, lifecycle support (including patch management), and maintainability. This represents a more modern, flexible certification mindset. The framework allows manufacturers to select appropriate evaluation levels based on the specific risks associated with their products' intended use. This approach aligns with the Cybersecurity Act's goal of establishing appropriate levels of assurance for different scenarios. Additionally, products certified under the EUCC at the "substantial" level or higher qualify for presumption of conformity with the Cyber Resilience Act (CRA).

What High-Assurance Certification Really Requires

While EUCC represents a major step toward harmonized cybersecurity certification in Europe, it does not automatically address every security or assurance gap in all use cases.

Organizations targeting high-risk or highly regulated environments may therefore need to evaluate whether EUCC alone provides sufficient coverage. A more detailed analysis of these gaps and limitations is available here: Is EUCC Enough? Addressing Gaps in European Cybersecurity Certification.

Achieving high-assurance certification under EUCC demands significantly more rigor than traditional Common Criteria approaches. Organizations must prepare for an intensive process that extends beyond conventional security testing.

Advanced vulnerability analysis (AVA_VAN.3 to AVA_VAN.5)

The foundation of high-assurance certification lies in comprehensive vulnerability assessment. AVA_VAN.3 introduces thorough analysis to identify vulnerabilities exploitable by attackers with Moderate attack potential (significant skills and resources). This level corresponds to EAL4, which represents a substantial increase in evaluation depth compared to basic assurance levels. At EAL4, the focus is on "Methodical Design" ensuring the product is built following high-quality commercial standards.

For AVA_VAN.4 and AVA_VAN.5 (corresponding to EAL5–EAL7), the scoring methodology becomes increasingly rigorous, shifting the target to resist "High" attack potential. This assumes an adversary with expert-level knowledge and nearly unlimited resources. The analysis evaluates factors such as:

Key Additions for EAL5:

Formal verification and design rigor

At EAL6, products must demonstrate high-level security engineering with formal verification methods. Semi-formal and formal design specifications must thoroughly describe security functions and their interactions. For EAL7, mathematical verification of design and implementation is mandatory, ensuring security functions are correctly specified and implemented. The security architecture documentation (ARC) must explain domain separation, initialization processes, and protection against tampering. Particularly for highest assurance levels, formal security models are required to mathematically verify security properties.

Lifecycle security and patch management

The EUCC distinguishes between standard vulnerability management and cases of active exploitation, defined as reliable evidence of unauthorized malicious code execution. In such instances, manufacturers are obligated to inform the Certification Body (CB) without undue delay and prioritize risk mitigation over recertification. The framework emphasizes that patching and correcting the vulnerability must take precedence, utilizing the patch management approaches defined in EUCC Annex IV. The following table outlines the mandatory maximum timeframes for conducting a vulnerability impact analysis, based on attack potential and severity:

Table: Guidance on maximum timeframes for the vulnerability impact analysis; CD=Calendar Days

Source: Self-edited based on ENISA EUCC Guidelines on Vulnerability Management and Disclosure (v1.1).

Understanding the Timelines and Extensions

The deadlines indicated in the table serve as recommended maximum limits to ensure timely responses to security threats:

By adhering to these structured timelines and rigorous impact assessments, including ISO/IEC 18045:2022 attack potential calculations, organizations ensure that high-assurance products remain resilient throughout their entire operational lifespan.

Preparing for EUCC: Practical Steps for Manufacturers

EUCC certification is a structured, multi-phase process designed to deliver high assurance for ICT products operating in risk-sensitive environments. From an executive perspective, predictable outcomes depend on early scoping, realistic planning, and alignment with accredited evaluation and certification bodies.

The process begins with an application to an EUCC-accredited Certification Body. At this stage, organizations define the certification scope, target assurance level, and evaluation boundaries. Early alignment at this point reduces uncertainty later in the process.

EUCC certification is fundamentally documentation-driven. Technical, architectural, security, and lifecycle documentation must clearly and consistently demonstrate how security objectives are implemented and maintained. Documentation maturity is the primary factor influencing evaluation predictability and effort. A consultant partner can be a good choice to bridge the gap between engineering reality and regulatory expectations, ensuring that internal technical specifications are translated into the precise, audit-ready evidence required to minimize evaluation risks and delays.

An EUCC-accredited testing laboratory (ITSEF) is required to conduct the evaluation in accordance with the CC2022 methodology. Many organizations also rely on external expertise to support preparation activities and ensure correct interpretation of EUCC and Common Criteria requirements.

The evaluation phase consists of structured documentation review, functional testing, and penetration testing, proportional to the selected assurance level. Higher assurance levels require deeper vulnerability analysis and may include site visits to verify lifecycle and operational controls.

Upon completion of the evaluation, the Certification Body reviews the Evaluation Technical Report and issues the final certification decision. A successful outcome results in the issuance of an EUCC certificate, confirming compliance with Common Criteria requirements under a harmonized European framework.

While evaluation activities typically take 6–8 months, organizations should plan for approximately 12 months end-to-end, depending on product complexity, assurance level, and preparation maturity. For a detailed operational overview of EUCC preparation and application steps, see: How to Prepare and Apply for EUCC Certification for Your Product

Conclusion

The transition from traditional Common Criteria to the European Union Cybersecurity Certification scheme marks a watershed moment for cybersecurity compliance across Europe. Previously fragmented certification landscapes now converge into a unified framework that addresses contemporary security challenges while eliminating cross-border inconsistencies.

Organizations seeking certification must recognize that EUCC demands significantly more than checkbox compliance. High-assurance certification especially requires comprehensive vulnerability analysis, formal verification methods, and robust lifecycle management processes. Companies must therefore assess their product risk profiles carefully before determining whether substantial or high assurance certification aligns with their security objectives and market requirements.

Undoubtedly, manufacturers face a more rigorous path to compliance under this new framework. The scheme's emphasis on continuous monitoring and rapid vulnerability remediation reflects a fundamental shift toward security as an ongoing process rather than a static achievement. This approach acknowledges the reality that security threats evolve constantly, thus requiring corresponding evolution in defensive capabilities.

Preparation stands as the critical success factor for EUCC certification. Thorough documentation, close collaboration with accredited evaluation facilities, and established vulnerability management procedures will determine an organization's certification journey. Additionally, manufacturers must integrate security considerations throughout the development lifecycle, particularly for products targeting EAL4 and above.

Though challenging, EUCC compliance delivers substantial benefits. Products certified under this framework enjoy presumed conformity with the Cyber Resilience Act, streamlining regulatory burdens. Equally important, this harmonized approach builds consumer trust while opening access to markets across the European Union. Ultimately, EUCC certification represents not just a regulatory hurdle but a strategic investment in product security and market positioning as Europe strengthens its cybersecurity posture for the digital age.

How QIMA CCLab Can Support You

At QIMA CCLab, we provide professional assistance to guide manufacturers through the European Union Cybersecurity Certification (EUCC) process. As an experienced evaluation facility, we support our clients by offering:

FAQ

What is the EUCC?

The European Union Cybersecurity Certification Scheme (EUCC) is a Common Criteria-based certification system drafted by the European Union Agency for Cybersecurity (ENISA). Adopted within the framework of the EU Cybersecurity Act (CSA), it harmonizes the evaluation and certification of Information and Communication Technology (ICT) products across Europe, replacing previous national schemes to ensure consistent cybersecurity standards across all EU member states.

What are the benefits of obtaining EUCC certification for my product?

Achieving EUCC certification demonstrates that your ICT product complies with rigorous cybersecurity standards, significantly enhancing its credibility and marketability. It also facilitates easier access to the European market by eliminating the need for multiple national certifications, allowing for the free movement of your certified products across all member states.

How can QIMA CCLab assist in achieving EUCC certification?

QIMA CCLab offers professional consultancy services to guide you through the EUCC certification process. Our team provides comprehensive support in preparing the necessary documentation, conducting independent security evaluations, and ensuring your product meets all required standards to facilitate an efficient and successful certification journey.


Related Articles

/