Why in News

India has assumed the Chair of the Common Criteria Development Board (CCDB) — the technical arm of the international Common Criteria Recognition Arrangement (CCRA) — for a two-year term from April 2026 to April 2028. The decision was confirmed at the 1st Quarter Meeting of the CCRA held in Tokyo from April 14-16, 2026, with the chairmanship formally vesting in officials of India’s STQC Directorate under the Ministry of Electronics and Information Technology (MeitY). Press coverage through mid-to-late May 2026 has framed the elevation as India moving from a rule-taker to a rule-maker in the global cybersecurity standards architecture.

What is the CCRA and the CCDB?

The Common Criteria Recognition Arrangement (CCRA) is an international multilateral agreement under which signatory countries mutually recognise certifications of Information Technology (IT) security products evaluated against the Common Criteria standard. Once a product is certified by an authorised national scheme of any member country, it is treated as certified across the arrangement — eliminating duplicative evaluations and reducing time and cost of cross-border procurement.

Body Function
CCRA Political-administrative arrangement; admits members; mediates the mutual-recognition framework
CCDB (Common Criteria Development Board) Technical core; maintains the Common Criteria standard and the Common Evaluation Methodology; manages the work programme
CCMC (Common Criteria Management Committee) Oversight body of authorising nations

Underlying Standards

Standard Subject
ISO/IEC 15408 Common Criteria for Information Technology Security Evaluation
ISO/IEC 18045 Common Evaluation Methodology (CEM) — how an evaluator actually conducts the assessment

Membership Structure

The CCRA presently comprises 38 member nations, divided into two tiers:

Tier Count Right
Certificate Authorizing Nations 20 Issue CC certificates recognised across the CCRA
Certificate Consuming Nations 18 Accept (consume) certificates issued by Authorizing Nations

Authorizing Nations include: USA, UK, Germany, France, Japan, Republic of Korea, Australia, Canada, Italy, Netherlands, Norway, Spain, Sweden, Türkiye, Malaysia, Singapore, and India.

India’s CCRA Journey

Year Milestone
September 16, 2013 India joined CCRA as a Certificate Authorizing Nation
2013 onward STQC Directorate operates the Indian Common Criteria Certification Scheme (IC3S)
April 2026 India assumes Chair of the CCDB for the 2026-2028 term

STQC — India’s Nodal Body

The Standardisation Testing and Quality Certification (STQC) Directorate functions under MeitY as the National Certification Body for the CC scheme. STQC operates the Indian Common Criteria Certification Scheme (IC3S), conducts CC evaluations at its labs at Kolkata, Bengaluru, and Delhi, and certifies products against Protection Profiles and Security Targets.

Important distinction for UPSC — DRDO is not the certifying body for the Common Criteria scheme in India. The body is STQC under MeitY, not DRDO.

Common Criteria — Technical Architecture

The CC framework rests on three core artefacts and a graded assurance ladder.

Core Artefacts

Artefact Purpose
Protection Profile (PP) An implementation-independent statement of security requirements for a class of products (e.g., firewalls, smartcards, mobile OS, network devices)
Security Target (ST) A vendor’s claim of how a specific product meets a PP (or its own bespoke requirements)
Evaluation Technical Report (ETR) The evaluator’s confidential report supporting the certificate

Evaluation Assurance Levels (EALs)

The CC defines seven Evaluation Assurance Levels of increasing rigour.

Level Description Typical Use
EAL1 Functionally tested Lowest assurance; consumer products
EAL2 Structurally tested Low-risk environments
EAL3 Methodically tested and checked Moderate-risk commercial
EAL4 Methodically designed, tested, reviewed Highest level cost-effective without speciality engineering — commercial workhorse
EAL5 Semi-formally designed and tested Specialised high-assurance
EAL6 Semi-formally verified design High-value government / military
EAL7 Formally verified design and tested Maximum assurance — used in nuclear command, classified comms

Significance of India’s Chairmanship

Strategic Rationale

  1. Standards diplomacy: Chairing the CCDB places India in the same standards-leadership cohort as the USA, UK, Germany, and Japan — a meaningful elevation in the tech standards arena that includes ITU-T, IEEE, 3GPP, ISO/IEC JTC 1, and IETF.
  2. Domestic certification capacity: Chairmanship strengthens STQC’s voice in shaping Protection Profiles for product classes where India has emerging vendor depth — telecom equipment, digital identity, IoT, automotive electronics.
  3. Cybersecurity sovereignty: India will help author rules under which products entering its government, defence, and critical-infrastructure procurement chain are evaluated — narrowing supply-chain risk windows.
  4. Indo-US iCET alignment: The initiative on Critical and Emerging Technologies (iCET, 2022) explicitly identifies cybersecurity standards harmonisation as a sub-track. CCDB chairmanship operationalises that intent.

Use-Case Footprint of CC-Certified Products in India

Domain Use of CC Certification
Defence procurement Cryptographic modules, secure routers, COMSEC equipment
Critical Information Infrastructure (CII) Notified by NCIIPC under Section 70A of the IT Act, 2000
Telecom TSDSI standards alignment; trusted source designations
Digital identity Aadhaar authentication ecosystem; eSign and DigiLocker security modules
Banking & payments UPI infrastructure security elements; HSMs and smartcards

India’s Cybersecurity Institutional Framework

Body Acronym Year Parent Statutory Basis
Computer Emergency Response Team — India CERT-In 2004 MeitY Section 70B, IT Act, 2000
National Critical Information Infrastructure Protection Centre NCIIPC 2014 (operational) NTRO Section 70A, IT Act, 2000
Indian Cybercrime Coordination Centre I4C 2018 MHA Administrative scheme
Standardisation Testing and Quality Certification STQC 1980 MeitY Administrative
National Cyber Security Coordinator NCSC 2014 PMO / National Security Council Secretariat Administrative
Data Protection Board of India DPB 2023-24 (post-DPDP Act) MeitY Digital Personal Data Protection Act, 2023

Why the Chair Matters Right Now

Three converging policy currents make 2026 a pointed moment for India to lead the CCDB.

1. Domestic Legislative Architecture

The Digital Personal Data Protection (DPDP) Act, 2023 introduced the concept of the Significant Data Fiduciary (SDF) — entities designated by the Board on the basis of data volume, sensitivity, and risk. SDFs face heightened audit and security obligations for which CC-evaluated products are a natural compliance vehicle.

2. Semiconductor and 5G/6G Push

The India Semiconductor Mission (ISM) under MeitY, with a corpus of approximately ₹76,000 crore, anticipates Indian-fabricated chips serving sensitive markets (defence, automotive, telecom). Those markets increasingly demand CC certification at EAL4 and above. The Bharat 6G Alliance, launched in 2023, similarly contemplates CC-aligned trust frameworks for next-generation telecom.

3. Post-Quantum Readiness

CCDB working groups are drafting Protection Profiles for post-quantum-cryptography (PQC) primitives following the NIST PQC standardisation announcements. India’s chair lets STQC shape PQC PPs that align with domestic cryptographic priorities (e.g., CCA-led indigenous algorithms for government use).

UPSC Relevance

  • GS Paper 2 — International Relations: India and international institutions, agencies, and fora — their structure and mandate; bilateral, regional, and global groupings affecting India’s interests; effect of policies and politics of other countries on India.
  • GS Paper 3 — Internal Security: Challenges to internal security through communication networks; basics of cyber security; role of standards and certifications in protecting critical information infrastructure.
  • GS Paper 3 — Science & Technology: Awareness in the fields of IT, computers, and indigenisation of technology; standards and intellectual property in emerging technologies.
  • Essay linkage: “Digital sovereignty” — the role of standards bodies in shaping the geopolitics of technology.

Facts Corner

  • CCRA full form: Common Criteria Recognition Arrangement — international IT security product certification mutual-recognition framework.
  • CCDB full form: Common Criteria Development Board — technical arm of the CCRA.
  • India’s CCDB chairmanship tenure: April 2026 — April 2028.
  • Confirmation venue: 1st Quarter CCRA Meeting, Tokyo, April 14-16, 2026.
  • India joined CCRA: September 16, 2013 as a Certificate Authorizing Nation.
  • Indian nodal body: STQC Directorate under MeitY (NOT DRDO).
  • Indian scheme name: Indian Common Criteria Certification Scheme (IC3S).
  • Underlying standard: ISO/IEC 15408 (Common Criteria).
  • Evaluation methodology standard: ISO/IEC 18045 (Common Evaluation Methodology / CEM).
  • CCRA membership: 38 nations — 20 Authorizing + 18 Consuming.
  • Evaluation Assurance Levels: EAL1 (lowest) to EAL7 (highest); EAL4 is the commercial workhorse.
  • CERT-In: established 2004; under MeitY; Section 70B, IT Act, 2000.
  • NCIIPC: under NTRO; Section 70A, IT Act, 2000.
  • I4C: under MHA; established 2018.
  • DPDP Act: 2023 — created the Data Protection Board.
  • Indo-US iCET: launched 2022 — has a cybersecurity sub-track.
  • India Semiconductor Mission corpus: ~₹76,000 crore.
  • Bharat 6G Alliance: launched 2023.

Sources: Press Information Bureau, MeitY, STQC