Our programs

Cryptographic evaluations

We analyse products intended to be used by Australian and New Zealand government agencies to determine whether the security architecture and cryptographic algorithms they use have been implemented correctly and are strong enough for the products intended use. … read more

Emanation security program

All electronic information systems emit electromagnetic radiation. In some cases this can reveal information and pose a security risk. Emanation security prevents people discovering information by collecting and analysing this radiation. What our Emanation … read more

Evaluation assurance levels (EAL)

The Common Criteria have seven assurance levels: from EAL1, the lowest, to EAL7, the highest. At present, only assurance levels up to EAL2 have been incorporated within the international Common Criteria Recognition Arrangement (CCRA) (PDF). The seven levels … read more

High assurance evaluations

A high assurance evaluation encompasses rigorous analysis and testing to search for any vulnerabilities in a product or system. What our high assurance evaluations do Our high assurance evaluations determine whether a product or system is architected, … read more

JCSC locations

Joint Cyber Security Centres (JCSC) are rolling out across the country. Brisbane The first Joint Cyber Security Centre opened in Brisbane on February 24, 2017. Location: Level 12, 340 Adelaide St, Brisbane. Melbourne The Melbourne JCSC opened on October 11, … read more

JCSC partners

Our JCSC program partners include: A Abacus Property Pty Limited ActewAGL Adelaide Airport AGL Energy Ltd AMP Services Limited ASX Ausgrid Australia and New Zealand Banking Group Limited (ANZ) Australian Criminal Intelligence Commission Australian Energy … read more

Protection Profiles

A Protection Profile is a document that stipulates the security functionality that must be included in a Common Criteria evaluation. Agencies can have confidence that the scope of an evaluation against an ACSC-approved Protection Profile covers the necessary … read more

Submitting ICT security products for evaluation

If you are an industry consultant or a product developer and would like your product evaluated, use the following checklist: Step 1  Conduct background research on government agency security needs through the Australian Government Information Security Manual … read more