
ISO 15408:2022
ISO 15408:2022 Information security, cybersecurity and privacy protection – Evaluation criteria for IT security – Part 1: Introduction and general model
CDN $0.00
Description
This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.
This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts of the ISO/IEC 15408 series; defines the terms and abbreviations to be used in all parts of the standard; establishes the core concept of a Target of Evaluation (TOE); describes the evaluation context and describes the audience to which the evaluation criteria is addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given.
This document introduces:
-   the key concepts of Protection Profiles (PP), PP-Modules, PP-Configurations, packages, Security Targets (ST), and conformance types;
-   a description of the organization of security components throughout the model;
-   the various operations by which the functional and assurance components given in ISO/IEC 15408‑2 and ISO/IEC 15408‑3 can be tailored through the use of permitted operations;
-   general information about the evaluation methods given in ISO/IEC 18045;
-   guidance for the application of ISO/IEC 15408‑4 in order to develop evaluation methods (EM) and evaluation activities (EA) derived from ISO/IEC 18045;
-   general information about the pre-defined Evaluation Assurance Levels (EALs) defined in ISO/IEC 15408‑5;
-   information in regard to the scope of evaluation schemes.
Edition
4
Published Date
2022-08-09
Status
PUBLISHED
Pages
142
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.
This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts of the ISO/IEC 15408 series; defines the terms and abbreviations to be used in all parts of the standard; establishes the core concept of a Target of Evaluation (TOE); describes the evaluation context and describes the audience to which the evaluation criteria is addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given.
This document introduces:
-   the key concepts of Protection Profiles (PP), PP-Modules, PP-Configurations, packages, Security Targets (ST), and conformance types;
-   a description of the organization of security components throughout the model;
-   the various operations by which the functional and assurance components given in ISO/IEC 15408‑2 and ISO/IEC 15408‑3 can be tailored through the use of permitted operations;
-   general information about the evaluation methods given in ISO/IEC 18045;
-   guidance for the application of ISO/IEC 15408‑4 in order to develop evaluation methods (EM) and evaluation activities (EA) derived from ISO/IEC 18045;
-   general information about the pre-defined Evaluation Assurance Levels (EALs) defined in ISO/IEC 15408‑5;
-   information in regard to the scope of evaluation schemes.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 27003:2017 Information technology – Security techniques – Information security management systems – Guidance
CDN $360.00 Add to cart -

ISO 20243:2023 Information technology – Open Trusted Technology ProviderTM Standard (O-TTPS) – Part 2: Assessment procedures for the O-TTPS
CDN $312.00 Add to cart -

ISO 27010:2015 Information technology – Security techniques – Information security management for inter-sector and inter-organizational communications
CDN $273.00 Add to cart -

ISO 21177:2024 Intelligent transport systems – ITS station security services for secure session establishment and authentication between trusted devices
CDN $390.00 Add to cart







