Common Criteria (CC) has traditionally focused on evaluating the security features of IT products, primarily hardware and software. This approach, while effective for standalone products, left a significant gap in the evaluation of cloud services and Software as a Service (SaaS) solutions. The rapid growth of cloud computing and the increasing reliance on these services in critical infrastructure and national security systems necessitated a reevaluation of the CC framework.
Different countries have taken various approaches to address the challenge of evaluating cloud services under the Common Criteria framework and other national cybersecurity schemes. Historically, the main efforts to ensure the cybersecurity of cloud services were targeted at the infrastructure level (like ISO 27017, Germany/BSI (C5), SecnumCloud in France or ENS in Spain).
The software ‘product’ was either not evaluated or the in-premise version was used to conduct the evaluation. With the popularization of cloud-native products like SaaS, the approach has become obsolete. Different initiatives were developed to find more comprehensive solutions to this problem.
In Europe, different national agencies have adapted existing methodologies to tackle the evaluation of cloud services. E.g. STIC evaluations on Spain or CSPN in France with a more practical approach aimed at securing the cloud services, not only the infrastructure.
This approach still had some limitations as Javier Tallón, director at jtsec Applus+, presented at the International Common Criteria Conference in Washington D.C. “Experiences evaluating cloud services and products”.
In the United States, the National Information Assurance Partnership (NIAP) has taken a significant step forward in adapting Common Criteria (CC) evaluations for cloud services with the publication of NIAP Policy Letter #32 on February 1, 2025. This policy marks a crucial shift in NIAP's approach, moving beyond the traditional focus on "products" to include "Services" and Cloud-based Software as a Service (SaaS) evaluations.
Key aspects of NIAP Policy Letter #32 about CC Cloud services include:
Lightship Security, an Applus+ Laboratories company, has been involved in a pilot project led by NIAP to conduct a Common Criteria evaluation of Microsoft Intune a cloud based product. Intune focuses on mobile device management (MDM) and mobile application management (MAM).
Lightship Security experts have been active participants in the Common Criteria in the Cloud Technical Community (CCitC), which is playing a crucial role in developing guidance for cloud evaluations. The CCitC published its first Public Release of the Guidance for Cloud Evaluations on February 6th, 2024. This community has received supporting Position Statements from Canada, USA, and Australia for their efforts in producing guidance for Protection Profile authors, schemes, labs, and vendors on CC evaluations in the cloud. On February 5th, 2025, the document was updated (v.1.1), incorporating feedback from the German Scheme, and work is underway on the next version to incorporate feedback from the Australian Scheme.
Both NIAP and Microsoft have been active participants in this Technical Community and are expected to share "lessons learned" from the Microsoft Intune evaluation in the future.
The evolution of Common Criteria evaluations to include cloud services marks a significant milestone in the field of cybersecurity. As various countries and organizations continue to develop and refine their methodologies, the collaboration between international bodies and technical communities will be crucial in establishing comprehensive and adaptable security assessments.
Applus+ Laboratories has led the evaluations of cloud services in the last few years. Our Spanish labs have conducted more than 100 CCN/STIC evaluations on cloud services.
The experiences and insights gained from pilot projects like the Microsoft Intune evaluation and similar projects will pave the way for more robust and effective certification processes, ensuring that cloud services meet the highest standards of security and reliability.
There are still a lot of challenges to be solved, and Applus+ Laboratories is committed to supporting the industry on this.
Applus+ uses first-party and third-party cookies for analytical purposes and to show you personalized advertising based on a profile drawn up based on your browsing habits (eg. visited websites). You can accept all cookies by pressing the "Accept" button or configure or reject their use. Consult our Cookies Policy for more information.
They allow the operation of the website, loading media content and its security. See the cookies we store in our Cookies Policy.
They allow us to know how you interact with the website, the number of visits in the different sections and to create statistics to improve our business practices. See the cookies we store in our Cookies Policy.