Common Criteria

Common Criteria EAL-2+

The Common Criteria for Information Technology Security Evaluation – Evaluation Assurance Level (EAL) – EventTracker has been structurally tested. View details


US Army

US Army Certificate of Networthiness

The operational assessment of systems, applications, or devices to determine security, interoperability, supportability, sustainability, usability, (SISSU) and compliance with Federal, DoD, and CC/S/A regulations.


US Navy

Department of Navy Application and Database Management System (DADMS)

The authoritative list of software applications that are approved for use in all Navy and Marine Corps information technology systems.




Security Content Automation Protocol (SCAP) validation from the National Institute of Standards and Technology (NIST) in accordance with the Federal Desktop Core Configuration (FDCC) security mandate for all federal agencies.

The FDCC is a set of operating system configurations recommended by NIST for computing systems connected to the network of a United States government agency.



FIPS 140 – 2

The Federal Information Processing Standard (FIPS) Publication 140-2, FIPS PUB 140-2 html, is the computer security standard from the US Government used to accredit cryptographic modules. 


SANS  Consensus Audit Guidelines

With the change in FISMA reporting implemented on June 2013, the 20 Critical Controls become the centerpiece of effective security programs across government These controls allow those responsible for compliance and those responsible for security to agree, for the first time, on what needs to be done to make systems safer.

These Top 20 Controls were agreed upon by a powerful consortium brought together by John Gilligan (previously CIO of the US Department of Energy and the US Air Force) under the auspices of the Center for Strategic and International Studies. Members of the Consortium include NSA, US Cert, DoD JTF-GNO, the Department of Energy Nuclear Laboratories, Department of State, DoD Cyber Crime Center plus the top commercial forensics experts and pen testers that serve the banking and critical infrastructure communities.

The automation of these Top 20 Controls will radically lower the cost of security while improving its effectiveness.