Security Certifications
Security certification frameworks like Common Criteria and FIPS 140 form a large landscape of thousands of certificates, security targets and protection profiles. This site presents ongoing research on this landscape done by the Centre for Research on Cryptography and Security.
Use cases
Search
Search through our extracted certificate data, filter by categories or status. Explore the certificates without downloading and reading countless PDFs.
Read moreReferences
Explore the references between certificates in a graph. A certificate referencing another certificate often means that it builds on top of the referenced certificate.
Read moreNotifications
Subscribe to receive notifications about a vulnerability affecting a selected set of certified products.
Read moreUse the floating button in the bottom right corner of the page to add certificates to your selection from the certificate page or the search page. Once you are finished with your selection you can enter your email and subscribe for notifications about changes in the certificates or vulnerabilities affecting the certificates.
Alternatively, use the update feed button to get an ATOM feed of updates to a certificate.
Analysis
Explore our analysis of the security certifications landscape as it evolves over time.
Read moreCrowdsourcing
Help us improve this site by letting us know where data is missing or wrong.
Read moreUse the feedback bar on the right side of each certificate page. You can use it to give us feedback on individual data fields of the presented certificate, create a GitHub issue with your issue or feature request, or emails us with your input.
Do it yourself!
The tools used to create the datasets on this website as well as the datasets themselves are open-source and available on GitHub. Documentation, including a quick-start guide, can be found on this site.
About
Want to learn more about our research? More information, including our publications and the privacy policy of this site can be found here.