Shopping Cart

No products in the cart.

BS EN ISO/IEC 15408-2:2020

$215.11

Information technology. Security techniques. Evaluation criteria for IT security – Security functional components

Published By Publication Date Number of Pages
BSI 2020 244
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of ISO/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common security functionality requirements of many IT products.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 European foreword
Endorsement notice
25 Scope
Normative references
Terms and definitions, symbols and abbreviated terms
Overview
Organisation of this part of ISO/IEC 15408
26 Functional requirements paradigm
29 Security functional components
Overview
Class structure
30 Class name
Class introduction
Family structure
Family name
Family behaviour
31 Component levelling
Management
Audit
32 Component structure
Component identification
Functional elements
Dependencies
33 Component catalogue
34 Component changes highlighting
Class FAU: Security audit
35 Security audit automatic response (FAU_ARP)
Family Behaviour
Component levelling
Management of FAU_ARP.1
Audit of FAU_ARP.1
FAU_ARP.1 Security alarms
FAU_ARP.1.1
Security audit data generation (FAU_GEN)
Family Behaviour
Component levelling
Management of FAU_GEN.1, FAU_GEN.2
Audit of FAU_GEN.1, FAU_GEN.2
36 FAU_GEN.1 Audit data generation
FAU_GEN.1.1
FAU_GEN.1.2
FAU_GEN.2 User identity association
FAU_GEN.2.1
Security audit analysis (FAU_SAA)
Family Behaviour
Component levelling
37 Management of FAU_SAA.1
Management of FAU_SAA.2
Management of FAU_SAA.3
Management of FAU_SAA.4
Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4
FAU_SAA.1 Potential violation analysis
38 FAU_SAA.1.1
FAU_SAA.1.2
FAU_SAA.2 Profile based anomaly detection
FAU_SAA.2.1
FAU_SAA.2.2
FAU_SAA.2.3
FAU_SAA.3 Simple attack heuristics
FAU_SAA.3.1
FAU_SAA.3.2
FAU_SAA.3.3
39 FAU_SAA.4 Complex attack heuristics
FAU_SAA.4.1
FAU_SAA.4.2
FAU_SAA.4.3
Security audit review (FAU_SAR)
Family Behaviour
Component levelling
Management of FAU_SAR.1
Management of FAU_SAR.2, FAU_SAR.3
Audit of FAU_SAR.1
40 Audit of FAU_SAR.2
Audit of FAU_SAR.3
FAU_SAR.1 Audit review
FAU_SAR.1.1
FAU_SAR.1.2
FAU_SAR.2 Restricted audit review
FAU_SAR.2.1
FAU_SAR.3 Selectable audit review
FAU_SAR.3.1
Security audit event selection (FAU_SEL)
Family Behaviour
41 Component levelling
Management of FAU_SEL.1
Audit of FAU_SEL.1
FAU_SEL.1 Selective audit
FAU_SEL.1.1
Security audit event storage (FAU_STG)
Family Behaviour
Component levelling
42 Management of FAU_STG.1
Management of FAU_STG.2
Management of FAU_STG.3
Management of FAU_STG.4
Audit of FAU_STG.1, FAU_STG.2
Audit of FAU_STG.3
Audit of FAU_STG.4
FAU_STG.1 Protected audit trail storage
FAU_STG.1.1
FAU_STG.1.2
43 FAU_STG.2 Guarantees of audit data availability
FAU_STG.2.1
FAU_STG.2.2
FAU_STG.2.3
FAU_STG.3 Action in case of possible audit data loss
FAU_STG.3.1
FAU_STG.4 Prevention of audit data loss
FAU_STG.4.1
44 Class FCO: Communication
Non-repudiation of origin (FCO_NRO)
Family Behaviour
Component levelling
Management of FCO_NRO.1, FCO_NRO.2
Audit of FCO_NRO.1
45 Audit of FCO_NRO.2
FCO_NRO.1 Selective proof of origin
FCO_NRO.1.1
FCO_NRO.1.2
FCO_NRO.1.3
FCO_NRO.2 Enforced proof of origin
FCO_NRO.2.1
FCO_NRO.2.2
FCO_NRO.2.3
46 Non-repudiation of receipt (FCO_NRR)
Family Behaviour
Component levelling
Management of FCO_NRR.1, FCO_NRR.2
Audit of FCO_NRR.1
Audit of FCO_NRR.2
FCO_NRR.1 Selective proof of receipt
FCO_NRR.1.1
47 FCO_NRR.1.2
FCO_NRR.1.3
FCO_NRR.2 Enforced proof of receipt
FCO_NRR.2.1
FCO_NRR.2.2
FCO_NRR.2.3
48 Class FCS: Cryptographic support
Cryptographic key management (FCS_CKM)
Family Behaviour
Component levelling
49 Management of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4
Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4
FCS_CKM.1 Cryptographic key generation
FCS_CKM.1.1
FCS_CKM.2 Cryptographic key distribution
FCS_CKM.2.1
FCS_CKM.3 Cryptographic key access
50 FCS_CKM.3.1
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.4.1
Cryptographic operation (FCS_COP)
Family Behaviour
Component levelling
Management of FCS_COP.1
Audit of FCS_COP.1
51 FCS_COP.1 Cryptographic operation
FCS_COP.1.1
Class FDP: User data protection
53 Access control policy (FDP_ACC)
Family Behaviour
54 Component levelling
Management of FDP_ACC.1, FDP_ACC.2
Audit of FDP_ACC.1, FDP_ACC.2
FDP_ACC.1 Subset access control
FDP_ACC.1.1
FDP_ACC.2 Complete access control
FDP_ACC.2.1
FDP_ACC.2.2
Access control functions (FDP_ACF)
Family Behaviour
Component levelling
55 Management of FDP_ACF.1
Audit of FDP_ACF.1
FDP_ACF.1 Security attribute based access control
FDP_ACF.1.1
FDP_ACF.1.2
FDP_ACF.1.3
FDP_ACF.1.4
56 Data authentication (FDP_DAU)
Family Behaviour
Component levelling
Management of FDP_DAU.1, FDP_DAU.2
Audit of FDP_DAU.1
Audit of FDP_DAU.2
FDP_DAU.1 Basic Data Authentication
FDP_DAU.1.1
57 FDP_DAU.1.2
FDP_DAU.2 Data Authentication with Identity of Guarantor
FDP_DAU.2.1
FDP_DAU.2.2
Export from the TOE (FDP_ETC)
Family Behaviour
Component levelling
Management of FDP_ETC.1
Management of FDP_ETC.2
Audit of FDP_ETC.1, FDP_ETC.2
58 FDP_ETC.1 Export of user data without security attributes
FDP_ETC.1.1
FDP_ETC.1.2
FDP_ETC.2 Export of user data with security attributes
FDP_ETC.2.1
FDP_ETC.2.2
FDP_ETC.2.3
FDP_ETC.2.4
Information flow control policy (FDP_IFC)
Family Behaviour
59 Component levelling
Management of FDP_IFC.1, FDP_IFC.2
Audit of FDP_IFC.1, FDP_IFC.2
FDP_IFC.1 Subset information flow control
FDP_IFC.1.1
FDP_IFC.2 Complete information flow control
FDP_IFC.2.1
FDP_IFC.2.2
Information flow control functions (FDP_IFF)
Family Behaviour
60 Component levelling
Management of FDP_IFF.1, FDP_IFF.2
Management of FDP_IFF.3, FDP_IFF.4, FDP_IFF.5
Management of FDP_IFF.6
Audit of FDP_IFF.1, FDP_IFF.2, FDP_IFF.5
61 Audit of FDP_IFF.3, FDP_IFF.4, FDP_IFF.6
FDP_IFF.1 Simple security attributes
FDP_IFF.1.1
FDP_IFF.1.2
FDP_IFF.1.3
FDP_IFF.1.4
FDP_IFF.1.5
FDP_IFF.2 Hierarchical security attributes
62 FDP_IFF.2.1
FDP_IFF.2.2
FDP_IFF.2.3
FDP_IFF.2.4
FDP_IFF.2.5
FDP_IFF.2.6
FDP_IFF.3 Limited illicit information flows
FDP_IFF.3.1
63 FDP_IFF.4 Partial elimination of illicit information flows
FDP_IFF.4.1
FDP_IFF.4.2
FDP_IFF.5 No illicit information flows
FDP_IFF.5.1
FDP_IFF.6 Illicit information flow monitoring
FDP_IFF.6.1
Import from outside of the TOE (FDP_ITC)
Family Behaviour
Component levelling
64 Management of FDP_ITC.1, FDP_ITC.2
Audit of FDP_ITC.1, FDP_ITC.2
FDP_ITC.1 Import of user data without security attributes
FDP_ITC.1.1
FDP_ITC.1.2
FDP_ITC.1.3
FDP_ITC.2 Import of user data with security attributes
65 FDP_ITC.2.1
FDP_ITC.2.2
FDP_ITC.2.3
FDP_ITC.2.4
FDP_ITC.2.5
Internal TOE transfer (FDP_ITT)
Family Behaviour
Component levelling
Management of FDP_ITT.1, FDP_ITT.2
66 Management of FDP_ITT.3, FDP_ITT.4
Audit of FDP_ITT.1, FDP_ITT.2
Audit of FDP_ITT.3, FDP_ITT.4
FDP_ITT.1 Basic internal transfer protection
FDP_ITT.1.1
FDP_ITT.2 Transmission separation by attribute
FDP_ITT.2.1
67 FDP_ITT.2.2
FDP_ITT.3 Integrity monitoring
FDP_ITT.3.1
FDP_ITT.3.2
FDP_ITT.4 Attribute-based integrity monitoring
FDP_ITT.4.1
FDP_ITT.4.2
Residual information protection (FDP_RIP)
Family Behaviour
68 Component levelling
Management of FDP_RIP.1, FDP_RIP.2
Audit of FDP_RIP.1, FDP_RIP.2
FDP_RIP.1 Subset residual information protection
FDP_RIP.1.1
FDP_RIP.2 Full residual information protection
FDP_RIP.2.1
Rollback (FDP_ROL)
Family Behaviour
Component levelling
69 Management of FDP_ROL.1, FDP_ROL.2
Audit of FDP_ROL.1, FDP_ROL.2
FDP_ROL.1 Basic rollback
FDP_ROL.1.1
FDP_ROL.1.2
FDP_ROL.2 Advanced rollback
FDP_ROL.2.1
FDP_ROL.2.2
70 Stored data integrity (FDP_SDI)
Family Behaviour
Component levelling
Management of FDP_SDI.1
Management of FDP_SDI.2
Audit of FDP_SDI.1
Audit of FDP_SDI.2
FDP_SDI.1 Stored data integrity monitoring
71 FDP_SDI.1.1
FDP_SDI.2 Stored data integrity monitoring and action
FDP_SDI.2.1
FDP_SDI.2.2
Inter-TSF user data confidentiality transfer protection (FDP
Family Behaviour
Component levelling
Management of FDP_UCT.1
Audit of FDP_UCT.1
FDP_UCT.1 Basic data exchange confidentiality
72 FDP_UCT.1.1
Inter-TSF user data integrity transfer protection (FDP_UIT)
Family Behaviour
Component levelling
Management of FDP_UIT.1, FDP_UIT.2, FDP_UIT.3
Audit of FDP_UIT.1
Audit of FDP_UIT.2, FDP_UIT.3
73 FDP_UIT.1 Data exchange integrity
FDP_UIT.1.1
FDP_UIT.1.2
FDP_UIT.2 Source data exchange recovery
FDP_UIT.2.1
FDP_UIT.3 Destination data exchange recovery
74 FDP_UIT.3.1
Class FIA: Identification and authentication
75 Authentication failures (FIA_AFL)
Family Behaviour
Component levelling
76 Management of FIA_AFL.1
Audit of FIA_AFL.1
FIA_AFL.1 Authentication failure handling
FIA_AFL.1.1
FIA_AFL.1.2
User attribute definition (FIA_ATD)
Family Behaviour
Component levelling
Management of FIA_ATD.1
Audit of FIA_ATD.1
77 FIA_ATD.1 User attribute definition
FIA_ATD.1.1
Specification of secrets (FIA_SOS)
Family Behaviour
Component levelling
Management of FIA_SOS.1
Management of FIA_SOS.2
Audit of FIA_SOS.1, FIA_SOS.2
FIA_SOS.1 Verification of secrets
FIA_SOS.1.1
78 FIA_SOS.2 TSF Generation of secrets
FIA_SOS.2.1
FIA_SOS.2.2
User authentication (FIA_UAU)
Family Behaviour
Component levelling
Management of FIA_UAU.1
79 Management of FIA_UAU.2
Management of FIA_UAU.3, FIA_UAU.4, FIA_UAU.7
Management of FIA_UAU.5
Management of FIA_UAU.6
Audit of FIA_UAU.1
Audit of FIA_UAU.2
Audit of FIA_UAU.3
80 Audit of FIA_UAU.4
Audit of FIA_UAU.5
Audit of FIA_UAU.6
Audit of FIA_UAU.7
FIA_UAU.1 Timing of authentication
FIA_UAU.1.1
FIA_UAU.1.2
FIA_UAU.2 User authentication before any action
FIA_UAU.2.1
81 FIA_UAU.3 Unforgeable authentication
FIA_UAU.3.1
FIA_UAU.3.2
FIA_UAU.4 Single-use authentication mechanisms
FIA_UAU.4.1
FIA_UAU.5 Multiple authentication mechanisms
FIA_UAU.5.1
FIA_UAU.5.2
FIA_UAU.6 Re-authenticating
FIA_UAU.6.1
FIA_UAU.7 Protected authentication feedback
82 FIA_UAU.7.1
User identification (FIA_UID)
Family Behaviour
Component levelling
Management of FIA_UID.1
Management of FIA_UID.2
Audit of FIA_UID.1, FIA_UID.2
FIA_UID.1 Timing of identification
FIA_UID.1.1
FIA_UID.1.2
83 FIA_UID.2 User identification before any action
FIA_UID.2.1
User-subject binding (FIA_USB)
Family Behaviour
Component levelling
Management of FIA_USB.1
Audit of FIA_USB.1
FIA_USB.1 User-subject binding
FIA_USB.1.1
FIA_USB.1.2
84 FIA_USB.1.3
Class FMT: Security management
85 Management of functions in TSF (FMT_MOF)
Family Behaviour
Component levelling
Management of FMT_MOF.1
86 Audit of FMT_MOF.1
FMT_MOF.1 Management of security functions behaviour
FMT_MOF.1.1
Management of security attributes (FMT_MSA)
Family Behaviour
Component levelling
Management of FMT_MSA.1
Management of FMT_MSA.2
87 Management of FMT_MSA.3
Management of FMT_MSA.4
Audit of FMT_MSA.1
Audit of FMT_MSA.2
Audit of FMT_MSA.3
Audit of FMT_MSA.4
FMT_MSA.1 Management of security attributes
88 FMT_MSA.1.1
FMT_MSA.2 Secure security attributes
FMT_MSA.2.1
FMT_MSA.3 Static attribute initialisation
FMT_MSA.3.1
FMT_MSA.3.2
FMT_MSA.4 Security attribute value inheritance
FMT_MSA.4.1
89 Management of TSF data (FMT_MTD)
Family Behaviour
Component levelling
Management of FMT_MTD.1
Management of FMT_MTD.2
Management of FMT_MTD.3
Audit of FMT_MTD.1
Audit of FMT_MTD.2
Audit of FMT_MTD.3
FMT_MTD.1 Management of TSF data
90 FMT_MTD.1.1
FMT_MTD.2 Management of limits on TSF data
FMT_MTD.2.1
FMT_MTD.2.2
FMT_MTD.3 Secure TSF data
FMT_MTD.3.1
Revocation (FMT_REV)
Family Behaviour
Component levelling
Management of FMT_REV.1
91 Audit of FMT_REV.1
FMT_REV.1 Revocation
FMT_REV.1.1
FMT_REV.1.2
Security attribute expiration (FMT_SAE)
Family Behaviour
Component levelling
Management of FMT_SAE.1
Audit of FMT_SAE.1
FMT_SAE.1 Time-limited authorisation
92 FMT_SAE.1.1
FMT_SAE.1.2
Specification of Management Functions (FMT_SMF)
Family Behaviour
Component levelling
Management of FMT_SMF.1
Audit of FMT_SMF.1
FMT_SMF.1 Specification of Management Functions
FMT_SMF.1.1
Security management roles (FMT_SMR)
Family Behaviour
93 Component levelling
Management of FMT_SMR.1
Management of FMT_SMR.2
Management of FMT_SMR.3
Audit of FMT_SMR.1
Audit of FMT_SMR.2
Audit of FMT_SMR.3
FMT_SMR.1 Security roles
94 FMT_SMR.1.1
FMT_SMR.1.2
FMT_SMR.2 Restrictions on security roles
FMT_SMR.2.1
FMT_SMR.2.2
FMT_SMR.2.3
FMT_SMR.3 Assuming roles
FMT_SMR.3.1
95 Class FPR: Privacy
Anonymity (FPR_ANO)
Family Behaviour
Component levelling
Management of FPR_ANO.1, FPR_ANO.2
Audit of FPR_ANO.1, FPR_ANO.2
96 FPR_ANO.1 Anonymity
FPR_ANO.1.1
FPR_ANO.2 Anonymity without soliciting information
FPR_ANO.2.1
FPR_ANO.2.2
Pseudonymity (FPR_PSE)
Family Behaviour
Component levelling
Management of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3
Audit of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3
97 FPR_PSE.1 Pseudonymity
FPR_PSE.1.1
FPR_PSE.1.2
FPR_PSE.1.3
FPR_PSE.2 Reversible pseudonymity
FPR_PSE.2.1
FPR_PSE.2.2
FPR_PSE.2.3
FPR_PSE.2.4
FPR_PSE.3 Alias pseudonymity
FPR_PSE.3.1
98 FPR_PSE.3.2
FPR_PSE.3.3
FPR_PSE.3.4
Unlinkability (FPR_UNL)
Family Behaviour
Component levelling
Management of FPR_UNL.1
Audit of FPR_UNL.1
FPR_UNL.1 Unlinkability
FPR_UNL.1.1
Unobservability (FPR_UNO)
Family Behaviour
99 Component levelling
Management of FPR_UNO.1, FPR_UNO.2
Management of FPR_UNO.3
Management of FPR_UNO.4
Audit of FPR_UNO.1, FPR_UNO.2
Audit of FPR_UNO.3
Audit of FPR_UNO.4
FPR_UNO.1 Unobservability
100 FPR_UNO.1.1
FPR_UNO.2 Allocation of information impacting unobservabilit
FPR_UNO.2.1
FPR_UNO.2.2
FPR_UNO.3 Unobservability without soliciting information
FPR_UNO.3.1
FPR_UNO.4 Authorised user observability
FPR_UNO.4.1
Class FPT: Protection of the TSF
101 Fail secure (FPT_FLS)
Family Behaviour
102 Component levelling
Management of FPT_FLS.1
Audit of FPT_FLS.1
FPT_FLS.1 Failure with preservation of secure state
FPT_FLS.1.1
Availability of exported TSF data (FPT_ITA)
Family Behaviour
Component levelling
Management of FPT_ITA.1
Audit of FPT_ITA.1
FPT_ITA.1 Inter-TSF availability within a defined availabili
103 FPT_ITA.1.1
Confidentiality of exported TSF data (FPT_ITC)
Family Behaviour
Component levelling
Management of FPT_ITC.1
Audit of FPT_ITC.1
FPT_ITC.1 Inter-TSF confidentiality during transmission
FPT_ITC.1.1
Integrity of exported TSF data (FPT_ITI)
Family Behaviour
Component levelling
104 Management of FPT_ITI.1
Management of FPT_ITI.2
Audit of FPT_ITI.1
Audit of FPT_ITI.2
FPT_ITI.1 Inter-TSF detection of modification
FPT_ITI.1.1
FPT_ITI.1.2
FPT_ITI.2 Inter-TSF detection and correction of modification
105 FPT_ITI.2.1
FPT_ITI.2.2
FPT_ITI.2.3
Internal TOE TSF data transfer (FPT_ITT)
Family Behaviour
Component levelling
Management of FPT_ITT.1
Management of FPT_ITT.2
Management of FPT_ITT.3
106 Audit of FPT_ITT.1, FPT_ITT.2
Audit of FPT_ITT.3
FPT_ITT.1 Basic internal TSF data transfer protection
FPT_ITT.1.1
FPT_ITT.2 TSF data transfer separation
FPT_ITT.2.1
FPT_ITT.2.2
FPT_ITT.3 TSF data integrity monitoring
FPT_ITT.3.1
107 FPT_ITT.3.2
TSF physical protection (FPT_PHP)
Family Behaviour
Component levelling
Management of FPT_PHP.1
Management of FPT_PHP.2
Management of FPT_PHP.3
Audit of FPT_PHP.1
108 Audit of FPT_PHP.2
Audit of FPT_PHP.3
FPT_PHP.1 Passive detection of physical attack
FPT_PHP.1.1
FPT_PHP.1.2
FPT_PHP.2 Notification of physical attack
FPT_PHP.2.1
FPT_PHP.2.2
FPT_PHP.2.3
FPT_PHP.3 Resistance to physical attack
FPT_PHP.3.1
109 Trusted recovery (FPT_RCV)
Family Behaviour
Component levelling
Management of FPT_RCV.1
Management of FPT_RCV.2, FPT_RCV.3
Management of FPT_RCV.4
Audit of FPT_RCV.1, FPT_RCV.2, FPT_RCV.3
Audit of FPT_RCV.4
110 FPT_RCV.1 Manual recovery
FPT_RCV.1.1
FPT_RCV.2 Automated recovery
FPT_RCV.2.1
FPT_RCV.2.2
FPT_RCV.3 Automated recovery without undue loss
FPT_RCV.3.1
FPT_RCV.3.2
FPT_RCV.3.3
FPT_RCV.3.4
111 FPT_RCV.4 Function recovery
FPT_RCV.4.1
Replay detection (FPT_RPL)
Family Behaviour
Component levelling
Management of FPT_RPL.1
Audit of FPT_RPL.1
FPT_RPL.1 Replay detection
FPT_RPL.1.1
FPT_RPL.1.2
112 State synchrony protocol (FPT_SSP)
Family Behaviour
Component levelling
Management of FPT_SSP.1, FPT_SSP.2
Audit of FPT_SSP.1, FPT_SSP.2
FPT_SSP.1 Simple trusted acknowledgement
FPT_SSP.1.1
FPT_SSP.2 Mutual trusted acknowledgement
FPT_SSP.2.1
FPT_SSP.2.2
113 Time stamps (FPT_STM)
Family Behaviour
Component levelling
Management of FPT_STM.1
Audit of FPT_STM.1
FPT_STM.1 Reliable time stamps
FPT_STM.1.1
Inter-TSF TSF data consistency (FPT_TDC)
Family Behaviour
Component levelling
Management of FPT_TDC.1
Audit of FPT_TDC.1
114 FPT_TDC.1 Inter-TSF basic TSF data consistency
FPT_TDC.1.1
FPT_TDC.1.2
Testing of external entities (FPT_TEE)
Family Behaviour
Component levelling
Management of FPT_TEE.1
Audit of FPT_TEE.1
FPT_TEE.1 Testing of external entities
115 FPT_TEE.1.1
FPT_TEE.1.2
Internal TOE TSF data replication consistency (FPT_TRC)
Family Behaviour
Component levelling
Management of FPT_TRC.1
Audit of FPT_TRC.1
FPT_TRC.1 Internal TSF consistency
FPT_TRC.1.1
FPT_TRC.1.2
116 TSF self test (FPT_TST)
Family Behaviour
Component levelling
Management of FPT_TST.1
Audit of FPT_TST.1
FPT_TST.1 TSF testing
FPT_TST.1.1
FPT_TST.1.2
117 FPT_TST.1.3
Class FRU: Resource utilisation
Fault tolerance (FRU_FLT)
Family Behaviour
Component levelling
Management of FRU_FLT.1, FRU_FLT.2
Audit of FRU_FLT.1
Audit of FRU_FLT.2
118 FRU_FLT.1 Degraded fault tolerance
FRU_FLT.1.1
FRU_FLT.2 Limited fault tolerance
FRU_FLT.2.1
Priority of service (FRU_PRS)
Family Behaviour
Component levelling
Management of FRU_PRS.1, FRU_PRS.2
Audit of FRU_PRS.1, FRU_PRS.2
FRU_PRS.1 Limited priority of service
119 FRU_PRS.1.1
FRU_PRS.1.2
FRU_PRS.2 Full priority of service
FRU_PRS.2.1
FRU_PRS.2.2
Resource allocation (FRU_RSA)
Family Behaviour
Component levelling
Management of FRU_RSA.1
Management of FRU_RSA.2
120 Audit of FRU_RSA.1, FRU_RSA.2
FRU_RSA.1 Maximum quotas
FRU_RSA.1.1
FRU_RSA.2 Minimum and maximum quotas
FRU_RSA.2.1
FRU_RSA.2.2
121 Class FTA: TOE access
Limitation on scope of selectable attributes (FTA_LSA)
Family Behaviour
Component levelling
Management of FTA_LSA.1
Audit of FTA_LSA.1
122 FTA_LSA.1 Limitation on scope of selectable attributes
FTA_LSA.1.1
Limitation on multiple concurrent sessions (FTA_MCS)
Family Behaviour
Component levelling
Management of FTA_MCS.1
Management of FTA_MCS.2
Audit of FTA_MCS.1, FTA_MCS.2
FTA_MCS.1 Basic limitation on multiple concurrent sessions
FTA_MCS.1.1
123 FTA_MCS.1.2
FTA_MCS.2 Per user attribute limitation on multiple concurre
FTA_MCS.2.1
FTA_MCS.2.2
Session locking and termination (FTA_SSL)
Family Behaviour
Component levelling
Management of FTA_SSL.1
Management of FTA_SSL.2
Management of FTA_SSL.3
124 Management of FTA_SSL.4
Audit of FTA_SSL.1, FTA_SSL.2
Audit of FTA_SSL.3
Audit of FTA_SSL.4
FTA_SSL.1 TSF-initiated session locking
FTA_SSL.1.1
FTA_SSL.1.2
FTA_SSL.2 User-initiated locking
125 FTA_SSL.2.1
FTA_SSL.2.2
FTA_SSL.3 TSF-initiated termination
FTA_SSL.3.1
FTA_SSL.4 User-initiated termination
FTA_SSL.4.1
TOE access banners (FTA_TAB)
Family Behaviour
Component levelling
Management of FTA_TAB.1
Audit of FTA_TAB.1
FTA_TAB.1 Default TOE access banners
126 FTA_TAB.1.1
TOE access history (FTA_TAH)
Family Behaviour
Component levelling
Management of FTA_TAH.1
Audit of FTA_TAH.1
FTA_TAH.1 TOE access history
FTA_TAH.1.1
FTA_TAH.1.2
FTA_TAH.1.3
TOE session establishment (FTA_TSE)
Family Behaviour
Component levelling
127 Management of FTA_TSE.1
Audit of FTA_TSE.1
FTA_TSE.1 TOE session establishment
FTA_TSE.1.1
Class FTP: Trusted path/channels
128 Inter-TSF trusted channel (FTP_ITC)
Family Behaviour
Component levelling
Management of FTP_ITC.1
Audit of FTP_ITC.1
FTP_ITC.1 Inter-TSF trusted channel
FTP_ITC.1.1
129 FTP_ITC.1.2
FTP_ITC.1.3
Trusted path (FTP_TRP)
Family Behaviour
Component levelling
Management of FTP_TRP.1
Audit of FTP_TRP.1
FTP_TRP.1 Trusted path
FTP_TRP.1.1
130 FTP_TRP.1.2
FTP_TRP.1.3
BS EN ISO/IEC 15408-2:2020
$215.11