BS EN ISO/IEC 15408-2:2020
$215.11
Information technology. Security techniques. Evaluation criteria for IT security – Security functional components
Published By | Publication Date | Number of Pages |
BSI | 2020 | 244 |
This part of ISO/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common security functionality requirements of many IT products.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
5 | European foreword Endorsement notice |
25 | Scope Normative references Terms and definitions, symbols and abbreviated terms Overview Organisation of this part of ISO/IEC 15408 |
26 | Functional requirements paradigm |
29 | Security functional components Overview Class structure |
30 | Class name Class introduction Family structure Family name Family behaviour |
31 | Component levelling Management Audit |
32 | Component structure Component identification Functional elements Dependencies |
33 | Component catalogue |
34 | Component changes highlighting Class FAU: Security audit |
35 | Security audit automatic response (FAU_ARP) Family Behaviour Component levelling Management of FAU_ARP.1 Audit of FAU_ARP.1 FAU_ARP.1 Security alarms FAU_ARP.1.1 Security audit data generation (FAU_GEN) Family Behaviour Component levelling Management of FAU_GEN.1, FAU_GEN.2 Audit of FAU_GEN.1, FAU_GEN.2 |
36 | FAU_GEN.1 Audit data generation FAU_GEN.1.1 FAU_GEN.1.2 FAU_GEN.2 User identity association FAU_GEN.2.1 Security audit analysis (FAU_SAA) Family Behaviour Component levelling |
37 | Management of FAU_SAA.1 Management of FAU_SAA.2 Management of FAU_SAA.3 Management of FAU_SAA.4 Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4 FAU_SAA.1 Potential violation analysis |
38 | FAU_SAA.1.1 FAU_SAA.1.2 FAU_SAA.2 Profile based anomaly detection FAU_SAA.2.1 FAU_SAA.2.2 FAU_SAA.2.3 FAU_SAA.3 Simple attack heuristics FAU_SAA.3.1 FAU_SAA.3.2 FAU_SAA.3.3 |
39 | FAU_SAA.4 Complex attack heuristics FAU_SAA.4.1 FAU_SAA.4.2 FAU_SAA.4.3 Security audit review (FAU_SAR) Family Behaviour Component levelling Management of FAU_SAR.1 Management of FAU_SAR.2, FAU_SAR.3 Audit of FAU_SAR.1 |
40 | Audit of FAU_SAR.2 Audit of FAU_SAR.3 FAU_SAR.1 Audit review FAU_SAR.1.1 FAU_SAR.1.2 FAU_SAR.2 Restricted audit review FAU_SAR.2.1 FAU_SAR.3 Selectable audit review FAU_SAR.3.1 Security audit event selection (FAU_SEL) Family Behaviour |
41 | Component levelling Management of FAU_SEL.1 Audit of FAU_SEL.1 FAU_SEL.1 Selective audit FAU_SEL.1.1 Security audit event storage (FAU_STG) Family Behaviour Component levelling |
42 | Management of FAU_STG.1 Management of FAU_STG.2 Management of FAU_STG.3 Management of FAU_STG.4 Audit of FAU_STG.1, FAU_STG.2 Audit of FAU_STG.3 Audit of FAU_STG.4 FAU_STG.1 Protected audit trail storage FAU_STG.1.1 FAU_STG.1.2 |
43 | FAU_STG.2 Guarantees of audit data availability FAU_STG.2.1 FAU_STG.2.2 FAU_STG.2.3 FAU_STG.3 Action in case of possible audit data loss FAU_STG.3.1 FAU_STG.4 Prevention of audit data loss FAU_STG.4.1 |
44 | Class FCO: Communication Non-repudiation of origin (FCO_NRO) Family Behaviour Component levelling Management of FCO_NRO.1, FCO_NRO.2 Audit of FCO_NRO.1 |
45 | Audit of FCO_NRO.2 FCO_NRO.1 Selective proof of origin FCO_NRO.1.1 FCO_NRO.1.2 FCO_NRO.1.3 FCO_NRO.2 Enforced proof of origin FCO_NRO.2.1 FCO_NRO.2.2 FCO_NRO.2.3 |
46 | Non-repudiation of receipt (FCO_NRR) Family Behaviour Component levelling Management of FCO_NRR.1, FCO_NRR.2 Audit of FCO_NRR.1 Audit of FCO_NRR.2 FCO_NRR.1 Selective proof of receipt FCO_NRR.1.1 |
47 | FCO_NRR.1.2 FCO_NRR.1.3 FCO_NRR.2 Enforced proof of receipt FCO_NRR.2.1 FCO_NRR.2.2 FCO_NRR.2.3 |
48 | Class FCS: Cryptographic support Cryptographic key management (FCS_CKM) Family Behaviour Component levelling |
49 | Management of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4 Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4 FCS_CKM.1 Cryptographic key generation FCS_CKM.1.1 FCS_CKM.2 Cryptographic key distribution FCS_CKM.2.1 FCS_CKM.3 Cryptographic key access |
50 | FCS_CKM.3.1 FCS_CKM.4 Cryptographic key destruction FCS_CKM.4.1 Cryptographic operation (FCS_COP) Family Behaviour Component levelling Management of FCS_COP.1 Audit of FCS_COP.1 |
51 | FCS_COP.1 Cryptographic operation FCS_COP.1.1 Class FDP: User data protection |
53 | Access control policy (FDP_ACC) Family Behaviour |
54 | Component levelling Management of FDP_ACC.1, FDP_ACC.2 Audit of FDP_ACC.1, FDP_ACC.2 FDP_ACC.1 Subset access control FDP_ACC.1.1 FDP_ACC.2 Complete access control FDP_ACC.2.1 FDP_ACC.2.2 Access control functions (FDP_ACF) Family Behaviour Component levelling |
55 | Management of FDP_ACF.1 Audit of FDP_ACF.1 FDP_ACF.1 Security attribute based access control FDP_ACF.1.1 FDP_ACF.1.2 FDP_ACF.1.3 FDP_ACF.1.4 |
56 | Data authentication (FDP_DAU) Family Behaviour Component levelling Management of FDP_DAU.1, FDP_DAU.2 Audit of FDP_DAU.1 Audit of FDP_DAU.2 FDP_DAU.1 Basic Data Authentication FDP_DAU.1.1 |
57 | FDP_DAU.1.2 FDP_DAU.2 Data Authentication with Identity of Guarantor FDP_DAU.2.1 FDP_DAU.2.2 Export from the TOE (FDP_ETC) Family Behaviour Component levelling Management of FDP_ETC.1 Management of FDP_ETC.2 Audit of FDP_ETC.1, FDP_ETC.2 |
58 | FDP_ETC.1 Export of user data without security attributes FDP_ETC.1.1 FDP_ETC.1.2 FDP_ETC.2 Export of user data with security attributes FDP_ETC.2.1 FDP_ETC.2.2 FDP_ETC.2.3 FDP_ETC.2.4 Information flow control policy (FDP_IFC) Family Behaviour |
59 | Component levelling Management of FDP_IFC.1, FDP_IFC.2 Audit of FDP_IFC.1, FDP_IFC.2 FDP_IFC.1 Subset information flow control FDP_IFC.1.1 FDP_IFC.2 Complete information flow control FDP_IFC.2.1 FDP_IFC.2.2 Information flow control functions (FDP_IFF) Family Behaviour |
60 | Component levelling Management of FDP_IFF.1, FDP_IFF.2 Management of FDP_IFF.3, FDP_IFF.4, FDP_IFF.5 Management of FDP_IFF.6 Audit of FDP_IFF.1, FDP_IFF.2, FDP_IFF.5 |
61 | Audit of FDP_IFF.3, FDP_IFF.4, FDP_IFF.6 FDP_IFF.1 Simple security attributes FDP_IFF.1.1 FDP_IFF.1.2 FDP_IFF.1.3 FDP_IFF.1.4 FDP_IFF.1.5 FDP_IFF.2 Hierarchical security attributes |
62 | FDP_IFF.2.1 FDP_IFF.2.2 FDP_IFF.2.3 FDP_IFF.2.4 FDP_IFF.2.5 FDP_IFF.2.6 FDP_IFF.3 Limited illicit information flows FDP_IFF.3.1 |
63 | FDP_IFF.4 Partial elimination of illicit information flows FDP_IFF.4.1 FDP_IFF.4.2 FDP_IFF.5 No illicit information flows FDP_IFF.5.1 FDP_IFF.6 Illicit information flow monitoring FDP_IFF.6.1 Import from outside of the TOE (FDP_ITC) Family Behaviour Component levelling |
64 | Management of FDP_ITC.1, FDP_ITC.2 Audit of FDP_ITC.1, FDP_ITC.2 FDP_ITC.1 Import of user data without security attributes FDP_ITC.1.1 FDP_ITC.1.2 FDP_ITC.1.3 FDP_ITC.2 Import of user data with security attributes |
65 | FDP_ITC.2.1 FDP_ITC.2.2 FDP_ITC.2.3 FDP_ITC.2.4 FDP_ITC.2.5 Internal TOE transfer (FDP_ITT) Family Behaviour Component levelling Management of FDP_ITT.1, FDP_ITT.2 |
66 | Management of FDP_ITT.3, FDP_ITT.4 Audit of FDP_ITT.1, FDP_ITT.2 Audit of FDP_ITT.3, FDP_ITT.4 FDP_ITT.1 Basic internal transfer protection FDP_ITT.1.1 FDP_ITT.2 Transmission separation by attribute FDP_ITT.2.1 |
67 | FDP_ITT.2.2 FDP_ITT.3 Integrity monitoring FDP_ITT.3.1 FDP_ITT.3.2 FDP_ITT.4 Attribute-based integrity monitoring FDP_ITT.4.1 FDP_ITT.4.2 Residual information protection (FDP_RIP) Family Behaviour |
68 | Component levelling Management of FDP_RIP.1, FDP_RIP.2 Audit of FDP_RIP.1, FDP_RIP.2 FDP_RIP.1 Subset residual information protection FDP_RIP.1.1 FDP_RIP.2 Full residual information protection FDP_RIP.2.1 Rollback (FDP_ROL) Family Behaviour Component levelling |
69 | Management of FDP_ROL.1, FDP_ROL.2 Audit of FDP_ROL.1, FDP_ROL.2 FDP_ROL.1 Basic rollback FDP_ROL.1.1 FDP_ROL.1.2 FDP_ROL.2 Advanced rollback FDP_ROL.2.1 FDP_ROL.2.2 |
70 | Stored data integrity (FDP_SDI) Family Behaviour Component levelling Management of FDP_SDI.1 Management of FDP_SDI.2 Audit of FDP_SDI.1 Audit of FDP_SDI.2 FDP_SDI.1 Stored data integrity monitoring |
71 | FDP_SDI.1.1 FDP_SDI.2 Stored data integrity monitoring and action FDP_SDI.2.1 FDP_SDI.2.2 Inter-TSF user data confidentiality transfer protection (FDP Family Behaviour Component levelling Management of FDP_UCT.1 Audit of FDP_UCT.1 FDP_UCT.1 Basic data exchange confidentiality |
72 | FDP_UCT.1.1 Inter-TSF user data integrity transfer protection (FDP_UIT) Family Behaviour Component levelling Management of FDP_UIT.1, FDP_UIT.2, FDP_UIT.3 Audit of FDP_UIT.1 Audit of FDP_UIT.2, FDP_UIT.3 |
73 | FDP_UIT.1 Data exchange integrity FDP_UIT.1.1 FDP_UIT.1.2 FDP_UIT.2 Source data exchange recovery FDP_UIT.2.1 FDP_UIT.3 Destination data exchange recovery |
74 | FDP_UIT.3.1 Class FIA: Identification and authentication |
75 | Authentication failures (FIA_AFL) Family Behaviour Component levelling |
76 | Management of FIA_AFL.1 Audit of FIA_AFL.1 FIA_AFL.1 Authentication failure handling FIA_AFL.1.1 FIA_AFL.1.2 User attribute definition (FIA_ATD) Family Behaviour Component levelling Management of FIA_ATD.1 Audit of FIA_ATD.1 |
77 | FIA_ATD.1 User attribute definition FIA_ATD.1.1 Specification of secrets (FIA_SOS) Family Behaviour Component levelling Management of FIA_SOS.1 Management of FIA_SOS.2 Audit of FIA_SOS.1, FIA_SOS.2 FIA_SOS.1 Verification of secrets FIA_SOS.1.1 |
78 | FIA_SOS.2 TSF Generation of secrets FIA_SOS.2.1 FIA_SOS.2.2 User authentication (FIA_UAU) Family Behaviour Component levelling Management of FIA_UAU.1 |
79 | Management of FIA_UAU.2 Management of FIA_UAU.3, FIA_UAU.4, FIA_UAU.7 Management of FIA_UAU.5 Management of FIA_UAU.6 Audit of FIA_UAU.1 Audit of FIA_UAU.2 Audit of FIA_UAU.3 |
80 | Audit of FIA_UAU.4 Audit of FIA_UAU.5 Audit of FIA_UAU.6 Audit of FIA_UAU.7 FIA_UAU.1 Timing of authentication FIA_UAU.1.1 FIA_UAU.1.2 FIA_UAU.2 User authentication before any action FIA_UAU.2.1 |
81 | FIA_UAU.3 Unforgeable authentication FIA_UAU.3.1 FIA_UAU.3.2 FIA_UAU.4 Single-use authentication mechanisms FIA_UAU.4.1 FIA_UAU.5 Multiple authentication mechanisms FIA_UAU.5.1 FIA_UAU.5.2 FIA_UAU.6 Re-authenticating FIA_UAU.6.1 FIA_UAU.7 Protected authentication feedback |
82 | FIA_UAU.7.1 User identification (FIA_UID) Family Behaviour Component levelling Management of FIA_UID.1 Management of FIA_UID.2 Audit of FIA_UID.1, FIA_UID.2 FIA_UID.1 Timing of identification FIA_UID.1.1 FIA_UID.1.2 |
83 | FIA_UID.2 User identification before any action FIA_UID.2.1 User-subject binding (FIA_USB) Family Behaviour Component levelling Management of FIA_USB.1 Audit of FIA_USB.1 FIA_USB.1 User-subject binding FIA_USB.1.1 FIA_USB.1.2 |
84 | FIA_USB.1.3 Class FMT: Security management |
85 | Management of functions in TSF (FMT_MOF) Family Behaviour Component levelling Management of FMT_MOF.1 |
86 | Audit of FMT_MOF.1 FMT_MOF.1 Management of security functions behaviour FMT_MOF.1.1 Management of security attributes (FMT_MSA) Family Behaviour Component levelling Management of FMT_MSA.1 Management of FMT_MSA.2 |
87 | Management of FMT_MSA.3 Management of FMT_MSA.4 Audit of FMT_MSA.1 Audit of FMT_MSA.2 Audit of FMT_MSA.3 Audit of FMT_MSA.4 FMT_MSA.1 Management of security attributes |
88 | FMT_MSA.1.1 FMT_MSA.2 Secure security attributes FMT_MSA.2.1 FMT_MSA.3 Static attribute initialisation FMT_MSA.3.1 FMT_MSA.3.2 FMT_MSA.4 Security attribute value inheritance FMT_MSA.4.1 |
89 | Management of TSF data (FMT_MTD) Family Behaviour Component levelling Management of FMT_MTD.1 Management of FMT_MTD.2 Management of FMT_MTD.3 Audit of FMT_MTD.1 Audit of FMT_MTD.2 Audit of FMT_MTD.3 FMT_MTD.1 Management of TSF data |
90 | FMT_MTD.1.1 FMT_MTD.2 Management of limits on TSF data FMT_MTD.2.1 FMT_MTD.2.2 FMT_MTD.3 Secure TSF data FMT_MTD.3.1 Revocation (FMT_REV) Family Behaviour Component levelling Management of FMT_REV.1 |
91 | Audit of FMT_REV.1 FMT_REV.1 Revocation FMT_REV.1.1 FMT_REV.1.2 Security attribute expiration (FMT_SAE) Family Behaviour Component levelling Management of FMT_SAE.1 Audit of FMT_SAE.1 FMT_SAE.1 Time-limited authorisation |
92 | FMT_SAE.1.1 FMT_SAE.1.2 Specification of Management Functions (FMT_SMF) Family Behaviour Component levelling Management of FMT_SMF.1 Audit of FMT_SMF.1 FMT_SMF.1 Specification of Management Functions FMT_SMF.1.1 Security management roles (FMT_SMR) Family Behaviour |
93 | Component levelling Management of FMT_SMR.1 Management of FMT_SMR.2 Management of FMT_SMR.3 Audit of FMT_SMR.1 Audit of FMT_SMR.2 Audit of FMT_SMR.3 FMT_SMR.1 Security roles |
94 | FMT_SMR.1.1 FMT_SMR.1.2 FMT_SMR.2 Restrictions on security roles FMT_SMR.2.1 FMT_SMR.2.2 FMT_SMR.2.3 FMT_SMR.3 Assuming roles FMT_SMR.3.1 |
95 | Class FPR: Privacy Anonymity (FPR_ANO) Family Behaviour Component levelling Management of FPR_ANO.1, FPR_ANO.2 Audit of FPR_ANO.1, FPR_ANO.2 |
96 | FPR_ANO.1 Anonymity FPR_ANO.1.1 FPR_ANO.2 Anonymity without soliciting information FPR_ANO.2.1 FPR_ANO.2.2 Pseudonymity (FPR_PSE) Family Behaviour Component levelling Management of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3 Audit of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3 |
97 | FPR_PSE.1 Pseudonymity FPR_PSE.1.1 FPR_PSE.1.2 FPR_PSE.1.3 FPR_PSE.2 Reversible pseudonymity FPR_PSE.2.1 FPR_PSE.2.2 FPR_PSE.2.3 FPR_PSE.2.4 FPR_PSE.3 Alias pseudonymity FPR_PSE.3.1 |
98 | FPR_PSE.3.2 FPR_PSE.3.3 FPR_PSE.3.4 Unlinkability (FPR_UNL) Family Behaviour Component levelling Management of FPR_UNL.1 Audit of FPR_UNL.1 FPR_UNL.1 Unlinkability FPR_UNL.1.1 Unobservability (FPR_UNO) Family Behaviour |
99 | Component levelling Management of FPR_UNO.1, FPR_UNO.2 Management of FPR_UNO.3 Management of FPR_UNO.4 Audit of FPR_UNO.1, FPR_UNO.2 Audit of FPR_UNO.3 Audit of FPR_UNO.4 FPR_UNO.1 Unobservability |
100 | FPR_UNO.1.1 FPR_UNO.2 Allocation of information impacting unobservabilit FPR_UNO.2.1 FPR_UNO.2.2 FPR_UNO.3 Unobservability without soliciting information FPR_UNO.3.1 FPR_UNO.4 Authorised user observability FPR_UNO.4.1 Class FPT: Protection of the TSF |
101 | Fail secure (FPT_FLS) Family Behaviour |
102 | Component levelling Management of FPT_FLS.1 Audit of FPT_FLS.1 FPT_FLS.1 Failure with preservation of secure state FPT_FLS.1.1 Availability of exported TSF data (FPT_ITA) Family Behaviour Component levelling Management of FPT_ITA.1 Audit of FPT_ITA.1 FPT_ITA.1 Inter-TSF availability within a defined availabili |
103 | FPT_ITA.1.1 Confidentiality of exported TSF data (FPT_ITC) Family Behaviour Component levelling Management of FPT_ITC.1 Audit of FPT_ITC.1 FPT_ITC.1 Inter-TSF confidentiality during transmission FPT_ITC.1.1 Integrity of exported TSF data (FPT_ITI) Family Behaviour Component levelling |
104 | Management of FPT_ITI.1 Management of FPT_ITI.2 Audit of FPT_ITI.1 Audit of FPT_ITI.2 FPT_ITI.1 Inter-TSF detection of modification FPT_ITI.1.1 FPT_ITI.1.2 FPT_ITI.2 Inter-TSF detection and correction of modification |
105 | FPT_ITI.2.1 FPT_ITI.2.2 FPT_ITI.2.3 Internal TOE TSF data transfer (FPT_ITT) Family Behaviour Component levelling Management of FPT_ITT.1 Management of FPT_ITT.2 Management of FPT_ITT.3 |
106 | Audit of FPT_ITT.1, FPT_ITT.2 Audit of FPT_ITT.3 FPT_ITT.1 Basic internal TSF data transfer protection FPT_ITT.1.1 FPT_ITT.2 TSF data transfer separation FPT_ITT.2.1 FPT_ITT.2.2 FPT_ITT.3 TSF data integrity monitoring FPT_ITT.3.1 |
107 | FPT_ITT.3.2 TSF physical protection (FPT_PHP) Family Behaviour Component levelling Management of FPT_PHP.1 Management of FPT_PHP.2 Management of FPT_PHP.3 Audit of FPT_PHP.1 |
108 | Audit of FPT_PHP.2 Audit of FPT_PHP.3 FPT_PHP.1 Passive detection of physical attack FPT_PHP.1.1 FPT_PHP.1.2 FPT_PHP.2 Notification of physical attack FPT_PHP.2.1 FPT_PHP.2.2 FPT_PHP.2.3 FPT_PHP.3 Resistance to physical attack FPT_PHP.3.1 |
109 | Trusted recovery (FPT_RCV) Family Behaviour Component levelling Management of FPT_RCV.1 Management of FPT_RCV.2, FPT_RCV.3 Management of FPT_RCV.4 Audit of FPT_RCV.1, FPT_RCV.2, FPT_RCV.3 Audit of FPT_RCV.4 |
110 | FPT_RCV.1 Manual recovery FPT_RCV.1.1 FPT_RCV.2 Automated recovery FPT_RCV.2.1 FPT_RCV.2.2 FPT_RCV.3 Automated recovery without undue loss FPT_RCV.3.1 FPT_RCV.3.2 FPT_RCV.3.3 FPT_RCV.3.4 |
111 | FPT_RCV.4 Function recovery FPT_RCV.4.1 Replay detection (FPT_RPL) Family Behaviour Component levelling Management of FPT_RPL.1 Audit of FPT_RPL.1 FPT_RPL.1 Replay detection FPT_RPL.1.1 FPT_RPL.1.2 |
112 | State synchrony protocol (FPT_SSP) Family Behaviour Component levelling Management of FPT_SSP.1, FPT_SSP.2 Audit of FPT_SSP.1, FPT_SSP.2 FPT_SSP.1 Simple trusted acknowledgement FPT_SSP.1.1 FPT_SSP.2 Mutual trusted acknowledgement FPT_SSP.2.1 FPT_SSP.2.2 |
113 | Time stamps (FPT_STM) Family Behaviour Component levelling Management of FPT_STM.1 Audit of FPT_STM.1 FPT_STM.1 Reliable time stamps FPT_STM.1.1 Inter-TSF TSF data consistency (FPT_TDC) Family Behaviour Component levelling Management of FPT_TDC.1 Audit of FPT_TDC.1 |
114 | FPT_TDC.1 Inter-TSF basic TSF data consistency FPT_TDC.1.1 FPT_TDC.1.2 Testing of external entities (FPT_TEE) Family Behaviour Component levelling Management of FPT_TEE.1 Audit of FPT_TEE.1 FPT_TEE.1 Testing of external entities |
115 | FPT_TEE.1.1 FPT_TEE.1.2 Internal TOE TSF data replication consistency (FPT_TRC) Family Behaviour Component levelling Management of FPT_TRC.1 Audit of FPT_TRC.1 FPT_TRC.1 Internal TSF consistency FPT_TRC.1.1 FPT_TRC.1.2 |
116 | TSF self test (FPT_TST) Family Behaviour Component levelling Management of FPT_TST.1 Audit of FPT_TST.1 FPT_TST.1 TSF testing FPT_TST.1.1 FPT_TST.1.2 |
117 | FPT_TST.1.3 Class FRU: Resource utilisation Fault tolerance (FRU_FLT) Family Behaviour Component levelling Management of FRU_FLT.1, FRU_FLT.2 Audit of FRU_FLT.1 Audit of FRU_FLT.2 |
118 | FRU_FLT.1 Degraded fault tolerance FRU_FLT.1.1 FRU_FLT.2 Limited fault tolerance FRU_FLT.2.1 Priority of service (FRU_PRS) Family Behaviour Component levelling Management of FRU_PRS.1, FRU_PRS.2 Audit of FRU_PRS.1, FRU_PRS.2 FRU_PRS.1 Limited priority of service |
119 | FRU_PRS.1.1 FRU_PRS.1.2 FRU_PRS.2 Full priority of service FRU_PRS.2.1 FRU_PRS.2.2 Resource allocation (FRU_RSA) Family Behaviour Component levelling Management of FRU_RSA.1 Management of FRU_RSA.2 |
120 | Audit of FRU_RSA.1, FRU_RSA.2 FRU_RSA.1 Maximum quotas FRU_RSA.1.1 FRU_RSA.2 Minimum and maximum quotas FRU_RSA.2.1 FRU_RSA.2.2 |
121 | Class FTA: TOE access Limitation on scope of selectable attributes (FTA_LSA) Family Behaviour Component levelling Management of FTA_LSA.1 Audit of FTA_LSA.1 |
122 | FTA_LSA.1 Limitation on scope of selectable attributes FTA_LSA.1.1 Limitation on multiple concurrent sessions (FTA_MCS) Family Behaviour Component levelling Management of FTA_MCS.1 Management of FTA_MCS.2 Audit of FTA_MCS.1, FTA_MCS.2 FTA_MCS.1 Basic limitation on multiple concurrent sessions FTA_MCS.1.1 |
123 | FTA_MCS.1.2 FTA_MCS.2 Per user attribute limitation on multiple concurre FTA_MCS.2.1 FTA_MCS.2.2 Session locking and termination (FTA_SSL) Family Behaviour Component levelling Management of FTA_SSL.1 Management of FTA_SSL.2 Management of FTA_SSL.3 |
124 | Management of FTA_SSL.4 Audit of FTA_SSL.1, FTA_SSL.2 Audit of FTA_SSL.3 Audit of FTA_SSL.4 FTA_SSL.1 TSF-initiated session locking FTA_SSL.1.1 FTA_SSL.1.2 FTA_SSL.2 User-initiated locking |
125 | FTA_SSL.2.1 FTA_SSL.2.2 FTA_SSL.3 TSF-initiated termination FTA_SSL.3.1 FTA_SSL.4 User-initiated termination FTA_SSL.4.1 TOE access banners (FTA_TAB) Family Behaviour Component levelling Management of FTA_TAB.1 Audit of FTA_TAB.1 FTA_TAB.1 Default TOE access banners |
126 | FTA_TAB.1.1 TOE access history (FTA_TAH) Family Behaviour Component levelling Management of FTA_TAH.1 Audit of FTA_TAH.1 FTA_TAH.1 TOE access history FTA_TAH.1.1 FTA_TAH.1.2 FTA_TAH.1.3 TOE session establishment (FTA_TSE) Family Behaviour Component levelling |
127 | Management of FTA_TSE.1 Audit of FTA_TSE.1 FTA_TSE.1 TOE session establishment FTA_TSE.1.1 Class FTP: Trusted path/channels |
128 | Inter-TSF trusted channel (FTP_ITC) Family Behaviour Component levelling Management of FTP_ITC.1 Audit of FTP_ITC.1 FTP_ITC.1 Inter-TSF trusted channel FTP_ITC.1.1 |
129 | FTP_ITC.1.2 FTP_ITC.1.3 Trusted path (FTP_TRP) Family Behaviour Component levelling Management of FTP_TRP.1 Audit of FTP_TRP.1 FTP_TRP.1 Trusted path FTP_TRP.1.1 |
130 | FTP_TRP.1.2 FTP_TRP.1.3 |