C5-DEC CAD
Product presentation

C5-DEC CAD for secure-by-design engineering and certification workflows

C5-DEC CAD unifies Common Criteria tooling, SSDLC traceability, compliance workflows, cyber-physical system security assessment, cryptography, and resource management in one repository-centric platform. This page gives stakeholders a fast visual tour of the product capabilities.

3 interfaces CLI, TUI, and GUI
8+ modules CCT, SSDLC, CRA, SBOM, CPSSA, PM, ISMS, Crypto
Open formats Markdown, YAML, JSON, CSV, LaTeX
Traceability-first Doorstop-backed specification lifecycle
C5-DEC command-line help screen

Core capabilities

From requirements to reports

Common Criteria Toolbox

Browse SFR/SAR content, generate evaluation checklists, and work with component-level evidence.

CCT Browser Eval checklist SFR/SAR navigation

SSDLC + transformer

Manage artifact repositories and item relations, then import/export/convert/publish technical data. The SpecEngine pipeline now includes dependency content fingerprinting — SHA-256 hashes over referenced files so any source change is instantly surfaced in impacted spec items.

Doorstop Import/export Publishing Dependency fingerprinting

Traceability analytics

Visualize coverage, gaps, and link structures through browser dashboards and interactive graph reports. Dependency fingerprints extend this with automatic change detection across all referenced artifacts.

Coverage stats Spec browser Graph view Fingerprint impact analysis

DocEngine and ETR

Generate styled technical reports and presentations using Quarto templates and ETR pipelines.

Quarto PDF/HTML Template-driven

CRA, SBOM, and CPSSA

Support modern cybersecurity compliance and threat analysis with dedicated integrated workflows.

CRA checklists SBOM flows Threat modelling

Project and ISMS operations

Process time/cost reports, tag documentation, and monitor activity traces for operational readiness.

OpenProject conversion Cost analysis ISMS assistants

Typical value flow

One toolchain, continuous evidence
1. Define

Establish requirements and architecture artifacts with structured item repositories.

2. Analyze

Inspect CC content, threat models, and compliance obligations through dedicated modules.

3. Link

Create and validate traceability links across SRS, ARC, SWD, TCS, and TRP items.

4. Verify

Execute test and evaluation workflows. Dependency fingerprints flag all impacted spec items the moment a referenced source file or artifact changes.

5. Publish

Generate reports, traceability dashboards, and final deliverables for stakeholders.