Shopping Cart

No products in the cart.

BS EN ISO/IEC 15408-1:2020

$215.11

Information technology. Security techniques. Evaluation criteria for IT security – Introduction and general model

Published By Publication Date Number of Pages
BSI 2020 78
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of ISO/IEC 15408 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.

Part one provides an overview of all parts of ISO/IEC 15408 standard. It describes the various parts of the standard; defines the terms and abbreviations to be used in all parts of the standard; establishes the core concept of a Target of Evaluation (TOE); the evaluation context and describes the audience to which the evaluation criteria are addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given.

It defines the various operations by which the functional and assurance components given in ISO/IEC 15408-2 and ISO/IEC 15408-3 may be tailored through the use of permitted operations.

The key concepts of protection profiles (PP), packages of security requirements and the topic of conformance are specified and the consequences of evaluation, evaluation results are described. This part of ISO/IEC 15408 gives guidelines for the specification of Security Targets (ST) and provides a description of the organization of components throughout the model. General information about the evaluation methodology are given in ISO/IEC 18045 and the scope of evaluation schemes is provided.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 European foreword
Endorsement notice
13 2 Normative references
3 Terms and definitions
14 3.1 Terms and definitions common in ISO/IEC 15408
21 3.2 Terms and definitions related to the ADV class
25 3.3 Terms and definitions related to the AGD class
3.4 Terms and definitions related to the ALC class
29 3.5 Terms and definitions related to the AVA class
3.6 Terms and definitions related to the ACO class
30 4 Abbreviated terms
31 5 Overview
5.1 General
5.2 The TOE
5.2.1 Different representations of the TOE
32 5.2.2 Different configurations of the TOE
5.3 Target audience of ISO/IEC 15408
5.3.1 Consumers
5.3.2 Developers
33 5.3.3 Evaluators
5.3.4 Others
5.4 The different parts of ISO/IEC 15408
34 5.5 Evaluation context
6 General model
6.1 Introduction to the general model
35 6.2 Assets and countermeasures
37 6.2.1 Sufficiency of the countermeasures
38 6.2.2 Correctness of the TOE
6.2.3 Correctness of the Operational Environment
39 6.3 Evaluation
7 Tailoring Security Requirements
7.1 Operations
40 7.1.1 The iteration operation
7.1.2 The assignment operation
41 7.1.3 The selection operation
7.1.4 The refinement operation
42 7.2 Dependencies between components
7.3 Extended components
43 8 Protection Profiles and Packages
8.1 Introduction
8.2 Packages
8.3 Protection Profiles
46 8.4 Using PPs and packages
8.5 Using Multiple Protection Profiles
9 Evaluation results
9.1 Introduction
47 9.2 Results of a PP evaluation
9.3 Results of an ST/TOE evaluation
9.4 Conformance claim
48 9.5 Use of ST/TOE evaluation results
BS EN ISO/IEC 15408-1:2020
$215.11