{"id":38,"date":"2024-09-05T15:12:56","date_gmt":"2024-09-05T15:12:56","guid":{"rendered":"https:\/\/cabinet-louis-reynaud.eu\/?page_id=38"},"modified":"2025-07-23T14:33:53","modified_gmt":"2025-07-23T14:33:53","slug":"cyber-security-des-ict-products-fitcem","status":"publish","type":"page","link":"https:\/\/cabinet-louis-reynaud.eu\/en\/cyber-security-des-ict-products-fitcem\/","title":{"rendered":"ICT products cybersecurity \u2013 EN 17640\u200b"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"38\" class=\"elementor elementor-38\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a193ff1 e-flex e-con-boxed e-con e-parent\" data-id=\"a193ff1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7b667a0 e-con-full e-flex e-con e-child\" data-id=\"7b667a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb16329 elementor-widget elementor-widget-text-editor\" data-id=\"eb16329\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 class=\" translation-block\"><strong>Objective of the compliance assessment<\/strong><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6dc605c e-con-full e-flex e-con e-child\" data-id=\"6dc605c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f8f5d2 elementor-widget elementor-widget-text-editor\" data-id=\"9f8f5d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>The conformity assessment of cybersecurity products implemented by CLR CERT addresses the need to verify compliance with security requirements and the robustness of an ICT product within a limited timeframe.<br \/>This certification program allows for testing the resilience of the security functions you have implemented in your product using the methodology of standard EN 17640, also known as FitCEM.<\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e2d9011 e-con-full e-flex e-con e-child\" data-id=\"e2d9011\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d387e3 elementor-widget elementor-widget-text-editor\" data-id=\"0d387e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Conformity Assessment: <\/strong>ICT products Cybersecurity \u2013 EN 17640<\/h4><h4><strong>Frameworks:<\/strong><\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d0017b6 e-con-full e-flex e-con e-child\" data-id=\"d0017b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06b7717 elementor-widget elementor-widget-htmega-datatable-addons\" data-id=\"06b7717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"htmega-datatable-addons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"htmega-table-style htmega-table-style-1 htb-table-responsive\">\n            <table class=\"htb-table\">\n                                <tbody>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-f6144c9\" >Test Plan<\/td><td class=\"elementor-repeater-item-1bd3910\" >CLR.PRO.026.PFITCEM<\/td>                        <\/tr>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-12a356f\" >Norm or Referential<\/td><td class=\"elementor-repeater-item-4a7f7bc\" >EN 17640<\/td>                        <\/tr>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-a480488\" >Application Profile 1<\/td><td class=\"elementor-repeater-item-89d5835\" >Application Mobile<\/td>                        <\/tr>\n                                            <tr>\n                                                    <\/tr>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-613a760\" >Application Profile 2<\/td><td class=\"elementor-repeater-item-829b3fb\" >Secure storage<\/td>                        <\/tr>\n                                            <tr>\n                                                    <\/tr>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-2c198f9\" >Application Profile 3<\/td><td class=\"elementor-repeater-item-9c9d388\" >Access control<\/td>                        <\/tr>\n                                            <tr>\n                                                    <\/tr>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-74f1b36\" >Application Profile 4<\/td><td class=\"elementor-repeater-item-be4dfdd\" >MDL<\/td>                        <\/tr>\n                                            <tr>\n                                                    <\/tr>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-3a9f01b\" >Application Profile 5<\/td><td class=\"elementor-repeater-item-c9a5a09\" > EUDI Wallet<\/td>                        <\/tr>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-18eb015\" >Evaluation methodology<\/td><td class=\"elementor-repeater-item-1e55afb\" >EN 17640<\/td>                        <\/tr>\n                                    <\/tbody>\n            <\/table>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Objectif de l&lsquo;\u00e9valuation de conformit\u00e9 L&rsquo;\u00e9valuation de conformit\u00e9 des produits de cybers\u00e9curit\u00e9 mis en place par CLR CERT correspond au besoin de v\u00e9rifier l\u2019exactitude aux exigences de s\u00e9curit\u00e9 et la robustesse d\u2019un produit ICT dans un temps restreint.Ce programme de certification permet de tester la r\u00e9sistance des fonctions de s\u00e9curit\u00e9 que vous avez mis en&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/cabinet-louis-reynaud.eu\/en\/cyber-security-des-ict-products-fitcem\/\">Read more<\/a><\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-38","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/pages\/38","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":45,"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/pages\/38\/revisions"}],"predecessor-version":[{"id":1316,"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/pages\/38\/revisions\/1316"}],"wp:attachment":[{"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/media?parent=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}