REGISTER

FR
Search
×
FR

Placeholder headline

This is just a placeholder headline

API Technical Report 2583 – Measurement of Produced Water for Custody Transfer

$

174

BUY NOW

Placeholder headline

This is just a placeholder headline

API Bulletin 592 – Elements of a Fixed Equipment Mechanical Integrity (FE MI) Program

$

142

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC Q1: Addenda 2

$

0

BUY NOW

Placeholder headline

This is just a placeholder headline

API TR 2583 : Measurement of Produced Water for Custody Transfer

$

174

BUY NOW

Placeholder headline

This is just a placeholder headline

API TR 2581: Wet Gas Sampling

$

189

BUY NOW

Placeholder headline

This is just a placeholder headline

API TR 2581 Wet Gas Sampling : Errata 1

$

0

BUY NOW

Placeholder headline

This is just a placeholder headline

API 510: Pressure Vessel Inspection Code: In-service Inspection, Rating, Repair, and Alteration

$

481

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 6AV1: Validation of Safety and Shutdown Valves for Sandy Service : Edition 4

$

208

BUY NOW

Placeholder headline

This is just a placeholder headline

API 510: Errata 2

$

0

BUY NOW

ISO 15408:2022

ISO 15408:2022 Information security, cybersecurity and privacy protection – Evaluation criteria for IT security – Part 1: Introduction and general model

CDN $0.00

SKU: 831ea201fdb0 Category:

Description

This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.

This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts of the ISO/IEC 15408 series; defines the terms and abbreviations to be used in all parts of the standard; establishes the core concept of a Target of Evaluation (TOE); describes the evaluation context and describes the audience to which the evaluation criteria is addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given.

This document introduces:

-    the key concepts of Protection Profiles (PP), PP-Modules, PP-Configurations, packages, Security Targets (ST), and conformance types;

-    a description of the organization of security components throughout the model;

-    the various operations by which the functional and assurance components given in ISO/IEC 15408‑2 and ISO/IEC 15408‑3 can be tailored through the use of permitted operations;

-    general information about the evaluation methods given in ISO/IEC 18045;

-    guidance for the application of ISO/IEC 15408‑4 in order to develop evaluation methods (EM) and evaluation activities (EA) derived from ISO/IEC 18045;

-    general information about the pre-defined Evaluation Assurance Levels (EALs) defined in ISO/IEC 15408‑5;

-    information in regard to the scope of evaluation schemes.

Edition

4

Published Date

2022-08-09

Status

PUBLISHED

Pages

142

Language Detail Icon

English

Format Secure Icon

Secure PDF

Abstract

This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.

This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts of the ISO/IEC 15408 series; defines the terms and abbreviations to be used in all parts of the standard; establishes the core concept of a Target of Evaluation (TOE); describes the evaluation context and describes the audience to which the evaluation criteria is addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given.

This document introduces:

-    the key concepts of Protection Profiles (PP), PP-Modules, PP-Configurations, packages, Security Targets (ST), and conformance types;

-    a description of the organization of security components throughout the model;

-    the various operations by which the functional and assurance components given in ISO/IEC 15408‑2 and ISO/IEC 15408‑3 can be tailored through the use of permitted operations;

-    general information about the evaluation methods given in ISO/IEC 18045;

-    guidance for the application of ISO/IEC 15408‑4 in order to develop evaluation methods (EM) and evaluation activities (EA) derived from ISO/IEC 18045;

-    general information about the pre-defined Evaluation Assurance Levels (EALs) defined in ISO/IEC 15408‑5;

-    information in regard to the scope of evaluation schemes.

Previous Editions

Can’t find what you are looking for?

Please contact us at: