Hardware configuration
For the evaluated configuration to remain Common Criteria-compliant, it must operate on a secure hardware configuration.
For the evaluated configuration to remain Common Criteria-compliant, it must operate on a secure hardware configuration.