CYBERSECURITY CERTIFICATION -
BUREAU VERITAS IOT CYBERSECURITY EVALUATION
A total of 15 security categories have been defined, representing the State of the Art in the matter of cybersecurity.

CYBERSECURITY CERTIFICATION PROCESS
- The manufacturer chooses a class of requirements and submits the device to be assessed.
Class#1 : For IoT products that operate in a non-sensitive environment, in which the common usage is not security oriented. Limited impact if the object is hacked. Connected to a local network only. Limited or no private data
Class#2 : For objects that need a first level of security, which operate in a sensitive environment. Serious and visible impact in case of service disruption or significant financial impact. Unauthorized disclosure of information shall be expected to have a serious adverse (private or sensitive data). Indirect connection to the web (i.e. connected to the wifi home box)
Class#3 : Reserved for products that need a real security assurance (substantial security level). Safety, security or serious financial impact if the object is hacked. Direct connection to the web. Unauthorized disclosure of information shall be expected to have a critical adverse (very sensitive data. Disruption of access to this device shall be expected to have a critical adverse effect on the service or the user.
- The manufacturer submit and Application Form to ask for the certification, which becomes the contract for the service.
- Additional information (questionnaire, evidences) are requested to the device vendors as per described in the BV cybersecurity IoT certification scheme and the Bureau Veritas IoT device cybersecurity Evaluation Methodology
- The Assessor verify the conformance of the devices to the selected requirements via testing, auditing or inspection
- In case of successful evaluation the certificate is deliver to the manufacturer
- Surveillance is performed for the Basic Advanced and Substantial Essential certificates