BS EN ISO/IEC 15408-1:2020
$215.11
Information technology. Security techniques. Evaluation criteria for IT security – Introduction and general model
Published By | Publication Date | Number of Pages |
BSI | 2020 | 78 |
This part of ISO/IEC 15408 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.
Part one provides an overview of all parts of ISO/IEC 15408 standard. It describes the various parts of the standard; defines the terms and abbreviations to be used in all parts of the standard; establishes the core concept of a Target of Evaluation (TOE); the evaluation context and describes the audience to which the evaluation criteria are addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given.
It defines the various operations by which the functional and assurance components given in ISO/IEC 15408-2 and ISO/IEC 15408-3 may be tailored through the use of permitted operations.
The key concepts of protection profiles (PP), packages of security requirements and the topic of conformance are specified and the consequences of evaluation, evaluation results are described. This part of ISO/IEC 15408 gives guidelines for the specification of Security Targets (ST) and provides a description of the organization of components throughout the model. General information about the evaluation methodology are given in ISO/IEC 18045 and the scope of evaluation schemes is provided.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
5 | European foreword Endorsement notice |
13 | 2 Normative references 3 Terms and definitions |
14 | 3.1 Terms and definitions common in ISO/IEC 15408 |
21 | 3.2 Terms and definitions related to the ADV class |
25 | 3.3 Terms and definitions related to the AGD class 3.4 Terms and definitions related to the ALC class |
29 | 3.5 Terms and definitions related to the AVA class 3.6 Terms and definitions related to the ACO class |
30 | 4 Abbreviated terms |
31 | 5 Overview 5.1 General 5.2 The TOE 5.2.1 Different representations of the TOE |
32 | 5.2.2 Different configurations of the TOE 5.3 Target audience of ISO/IEC 15408 5.3.1 Consumers 5.3.2 Developers |
33 | 5.3.3 Evaluators 5.3.4 Others 5.4 The different parts of ISO/IEC 15408 |
34 | 5.5 Evaluation context 6 General model 6.1 Introduction to the general model |
35 | 6.2 Assets and countermeasures |
37 | 6.2.1 Sufficiency of the countermeasures |
38 | 6.2.2 Correctness of the TOE 6.2.3 Correctness of the Operational Environment |
39 | 6.3 Evaluation 7 Tailoring Security Requirements 7.1 Operations |
40 | 7.1.1 The iteration operation 7.1.2 The assignment operation |
41 | 7.1.3 The selection operation 7.1.4 The refinement operation |
42 | 7.2 Dependencies between components 7.3 Extended components |
43 | 8 Protection Profiles and Packages 8.1 Introduction 8.2 Packages 8.3 Protection Profiles |
46 | 8.4 Using PPs and packages 8.5 Using Multiple Protection Profiles 9 Evaluation results 9.1 Introduction |
47 | 9.2 Results of a PP evaluation 9.3 Results of an ST/TOE evaluation 9.4 Conformance claim |
48 | 9.5 Use of ST/TOE evaluation results |