{"id":451461,"date":"2024-10-20T09:17:57","date_gmt":"2024-10-20T09:17:57","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-15408-12023\/"},"modified":"2024-10-26T17:20:10","modified_gmt":"2024-10-26T17:20:10","slug":"bs-en-iso-iec-15408-12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-15408-12023\/","title":{"rendered":"BS EN ISO\/IEC 15408-1:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
27<\/td>\n5.1 General
5.2 ISO\/IEC 15408 series description
5.2.1 General <\/td>\n<\/tr>\n
28<\/td>\n5.2.2 Audience <\/td>\n<\/tr>\n
31<\/td>\n5.3 Target of evaluation (TOE)
5.3.1 General
5.3.2 TOE boundaries <\/td>\n<\/tr>\n
32<\/td>\n5.3.3 Different representations of the TOE
5.3.4 Different configurations of the TOE
5.3.5 Operational environment of the TOE <\/td>\n<\/tr>\n
33<\/td>\n5.4 Presentation of material in this document
6.1 Background
6.2 Assets and security controls <\/td>\n<\/tr>\n
36<\/td>\n6.3 Core constructs of the paradigm of the ISO\/IEC 15408 series
6.3.1 General
6.3.2 Conformance types
6.3.3 Communicating security requirements <\/td>\n<\/tr>\n
39<\/td>\n6.3.4 Meeting the needs of consumers (risk owners) <\/td>\n<\/tr>\n
41<\/td>\n7.1 Security problem definition (SPD)
7.1.1 General
7.1.2 Threats <\/td>\n<\/tr>\n
42<\/td>\n7.1.3 Organizational security policies (OSPs)
7.1.4 Assumptions <\/td>\n<\/tr>\n
43<\/td>\n7.2 Security objectives
7.2.1 General
7.2.2 Security objectives for the TOE
7.2.3 Security objectives for the operational environment <\/td>\n<\/tr>\n
44<\/td>\n7.2.4 Relation between security objectives and the SPD
7.2.5 Tracing between security objectives and the SPD <\/td>\n<\/tr>\n
45<\/td>\n7.2.6 Providing a justification for the tracing
7.2.7 On countering threats
7.2.8 Security objectives: conclusion
7.3 Security requirements
7.3.1 General <\/td>\n<\/tr>\n
46<\/td>\n7.3.2 Security Functional Requirements (SFRs) <\/td>\n<\/tr>\n
48<\/td>\n7.3.3 Security assurance requirements (SARs) <\/td>\n<\/tr>\n
49<\/td>\n7.3.4 Security requirements: conclusion <\/td>\n<\/tr>\n
50<\/td>\n8.1 Hierarchical structure of security components
8.1.1 General
8.1.2 Class <\/td>\n<\/tr>\n
51<\/td>\n8.1.3 Family
8.1.4 Component
8.1.5 Element
8.2 Operations
8.2.1 General <\/td>\n<\/tr>\n
52<\/td>\n8.2.2 Iteration
8.2.3 Assignment <\/td>\n<\/tr>\n
53<\/td>\n8.2.4 Selection <\/td>\n<\/tr>\n
55<\/td>\n8.2.5 Refinement <\/td>\n<\/tr>\n
56<\/td>\n8.3 Dependencies between components
8.4 Extended components
8.4.1 General <\/td>\n<\/tr>\n
57<\/td>\n8.4.2 Defining extended components
9.1 General <\/td>\n<\/tr>\n
58<\/td>\n9.2 Package types
9.2.1 General
9.2.2 Assurance packages <\/td>\n<\/tr>\n
59<\/td>\n9.2.3 Functional packages
9.3 Package dependencies
9.4 Evaluation method(s) and activities <\/td>\n<\/tr>\n
60<\/td>\n10.1 General
10.2 PP introduction
10.3 Conformance claims and conformance statements <\/td>\n<\/tr>\n
63<\/td>\n10.4 Security assurance requirements (SARs)
10.5 Additional requirements common to strict and demonstrable conformance
10.5.1 Conformance claims and conformance statements
10.5.2 Security problem definition (SPD) <\/td>\n<\/tr>\n
64<\/td>\n10.5.3 Security objectives
10.6 Additional requirements specific to strict conformance
10.6.1 Requirements for the security problem definition (SPD)
10.6.2 Requirements for the security objectives
10.6.3 Requirements for the security requirements <\/td>\n<\/tr>\n
65<\/td>\n10.7 Additional requirements specific to demonstrable conformance
10.8 Additional requirements specific to exact conformance
10.8.1 General
10.8.2 Conformance claims and statements <\/td>\n<\/tr>\n
66<\/td>\n10.9 Using PPs
10.10 Conformance statements and claims in the case of multiple PPs
10.10.1 General
10.10.2 Where strict or demonstrable conformance is specified
10.10.3 Where exact conformance is specified
11.1 General <\/td>\n<\/tr>\n
67<\/td>\n11.2 PP-Modules
11.2.1 General
11.2.2 PP-Module Base
11.2.3 Requirements for PP-Modules <\/td>\n<\/tr>\n
71<\/td>\n11.3 PP-Configurations
11.3.1 General
11.3.2 Requirements for PP-Configurations <\/td>\n<\/tr>\n
77<\/td>\n11.3.3 Usage of PP-Configurations <\/td>\n<\/tr>\n
80<\/td>\n12.1 General
12.2 Conformance claims and statements <\/td>\n<\/tr>\n
83<\/td>\n12.3 Assurance requirements
12.4 Additional requirements in the exact conformance case
12.4.1 Additional requirements for the conformance claim
12.4.2 Additional requirements for the SPD <\/td>\n<\/tr>\n
84<\/td>\n12.4.3 Additional requirements for the security objectives
12.4.4 Additional requirements for the security requirements
12.5 Additional requirements in the multi-assurance case <\/td>\n<\/tr>\n
86<\/td>\n13.1 General <\/td>\n<\/tr>\n
88<\/td>\n13.2 Evaluation context <\/td>\n<\/tr>\n
89<\/td>\n13.3 Evaluation of PPs and PP-Configurations
13.4 Evaluation of STs
13.5 Evaluation of TOEs <\/td>\n<\/tr>\n
90<\/td>\n13.6 Evaluation methods and evaluation activities
13.7 Evaluation results
13.7.1 Results of a PP evaluation
13.7.2 Results of a PP-Configuration evaluation
13.7.3 Results of a ST\/TOE evaluation <\/td>\n<\/tr>\n
91<\/td>\n13.8 Multi-assurance evaluation <\/td>\n<\/tr>\n
92<\/td>\n14.1 General <\/td>\n<\/tr>\n
93<\/td>\n14.2 Composition models
14.2.1 Layered composition model <\/td>\n<\/tr>\n
94<\/td>\n14.2.2 Network or bi-directional composition model
14.2.3 Embedded composition model <\/td>\n<\/tr>\n
95<\/td>\n14.3 Evaluation techniques for providing assurance in composition models
14.3.1 General
14.3.2 ACO class for composed TOEs <\/td>\n<\/tr>\n
96<\/td>\n14.3.3 Composite evaluation for composite products <\/td>\n<\/tr>\n
107<\/td>\n14.4 Requirements for evaluations using composition techniques
14.4.1 Re-use of evaluation results <\/td>\n<\/tr>\n
108<\/td>\n14.4.2 Composition evaluation issues <\/td>\n<\/tr>\n
109<\/td>\n14.5 Evaluation by composition and multi-assurance <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security, cybersecurity and privacy protection. Evaluation criteria for IT security – Introduction and general model<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n156<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":451472,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-451461","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/451461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/451472"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=451461"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=451461"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=451461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}