BS EN ISO/IEC 15408-2:2023
$215.11
Information security, cybersecurity and privacy protection. Evaluation criteria for IT security – Security functional components
Published By | Publication Date | Number of Pages |
BSI | 2023 | 294 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
24 | 5.1 General 5.2 Organization of this document |
29 | 7.1 Overview 7.1.1 General 7.1.2 Class structure |
30 | 7.1.3 Family structure |
31 | 7.1.4 Component structure |
33 | 7.2 Component catalogue |
34 | 8.1 Class description |
35 | 8.2 Security audit automatic response (FAU_ARP) 8.2.1 Family behaviour 8.2.2 Components leveling and description 8.2.3 Management of FAU_ARP.1 8.2.4 Audit of FAU_ARP.1 8.2.5 FAU_ARP.1 Security alarms 8.3 Security audit data generation (FAU_GEN) 8.3.1 Family behaviour 8.3.2 Components leveling and description |
36 | 8.3.3 Management of FAU_GEN.1, FAU_GEN.2 8.3.4 Audit of FAU_GEN.1, FAU_GEN.2 8.3.5 FAU_GEN.1 Audit data generation 8.3.6 FAU_GEN.2 User identity association |
37 | 8.4 Security audit analysis (FAU_SAA) 8.4.1 Family behaviour 8.4.2 Components leveling and description 8.4.3 Management of FAU_SAA.1 |
38 | 8.4.4 Management of FAU_SAA.2 8.4.5 Management of FAU_SAA.3 8.4.6 Management of FAU_SAA.4 8.4.7 Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4 8.4.8 FAU_SAA.1 Potential violation analysis 8.4.9 FAU_SAA.2 Profile based anomaly detection |
39 | 8.4.10 FAU_SAA.3 Simple attack heuristics 8.4.11 FAU_SAA.4 Complex attack heuristics |
40 | 8.5 Security audit review (FAU_SAR) 8.5.1 Family behaviour 8.5.2 Components leveling and description 8.5.3 Management of FAU_SAR.1 8.5.4 Management of FAU_SAR.2, FAU_SAR.3 8.5.5 Audit of FAU_SAR.1 |
41 | 8.5.6 Audit of FAU_SAR.2 8.5.7 Audit of FAU_SAR.3 8.5.8 FAU_SAR.1 Audit review 8.5.9 FAU_SAR.2 Restricted audit review 8.5.10 FAU_SAR.3 Selectable audit review |
42 | 8.6 Security audit event selection (FAU_SEL) 8.6.1 Family behaviour 8.6.2 Components leveling and description 8.6.3 Management of FAU_SEL.1 8.6.4 Audit of FAU_SEL.1 8.6.5 FAU_SEL.1 Selective audit 8.7 Security audit data storage (FAU_STG) 8.7.1 Family behaviour |
43 | 8.7.2 Components leveling and description 8.7.3 Management of FAU_STG.1 8.7.4 Management of FAU_STG.2 8.7.5 Management of FAU_STG.3 8.7.6 Management of FAU_STG.4 8.7.7 Management of FAU_STG.5 |
44 | 8.7.8 Audit of FAU_STG.1 8.7.9 Audit of FAU_STG.2, FAU_STG.3 8.7.10 Audit of FAU_STG.4 8.7.11 Audit of FAU_STG.5 8.7.12 FAU_STG.1 Audit data storage location 8.7.13 FAU_STG.2 Protected audit data storage |
45 | 8.7.14 FAU_STG.3 Guarantees of audit data availability 8.7.15 FAU_STG.4 Action in case of possible audit data loss 8.7.16 FAU_STG.5 Prevention of audit data loss 9.1 Class description |
46 | 9.2 Non-repudiation of origin (FCO_NRO) 9.2.1 Family behaviour 9.2.2 Components leveling and description 9.2.3 Management of FCO_NRO.1, FCO_NRO.2 9.2.4 Audit of FCO_NRO.1 |
47 | 9.2.5 Audit of FCO_NRO.2 9.2.6 FCO_NRO.1 Selective proof of origin 9.2.7 FCO_NRO.2 Enforced proof of origin |
48 | 9.3 Non-repudiation of receipt (FCO_NRR) 9.3.1 Family behaviour 9.3.2 Components leveling and description 9.3.3 Management of FCO_NRR.1, FCO_NRR.2 9.3.4 Audit of FCO_NRR.1 9.3.5 Audit of FCO_NRR.2 |
49 | 9.3.6 FCO_NRR.1 Selective proof of receipt 9.3.7 FCO_NRR.2 Enforced proof of receipt 10.1 Class description |
50 | 10.2 Cryptographic key management (FCS_CKM) 10.2.1 Family behaviour 10.2.2 Components leveling and description |
51 | 10.2.3 Management of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6 10.2.4 Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6 10.2.5 FCS_CKM.1 Cryptographic key generation |
52 | 10.2.6 FCS_CKM.2 Cryptographic key distribution 10.2.7 FCS_CKM.3 Cryptographic key access 10.2.8 FCS_CKM.4 Cryptographic key destruction |
53 | 10.2.9 FCS_CKM.5 Cryptographic key derivation 10.2.10 FCS_CKM.6 Timing and event of cryptographic key destruction 10.3 Cryptographic operation (FCS_COP) 10.3.1 Family behaviour 10.3.2 Components leveling and description |
54 | 10.3.3 Management of FCS_COP.1 10.3.4 Audit of FCS_COP.1 10.3.5 FCS_COP.1 Cryptographic operation 10.4 Random bit generation (FCS_RBG) 10.4.1 Family behaviour 10.4.2 Components leveling and description |
55 | 10.4.3 Management of FCS_RBG.1, FCS_RBG.2, FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RBG.6 10.4.4 Audit of FCS_RBG.1, FCS_RBG.2 10.4.5 Audit of FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RBG.6 10.4.6 FCS_RBG.1 Random bit generation (RBG) |
56 | 10.4.7 FCS_RBG.2 Random bit generation (external seeding) 10.4.8 FCS_RBG.3 Random bit generation (internal seeding – single source) |
57 | 10.4.9 FCS_RBG.4 Random bit generation (internal seeding – multiple sources) 10.4.10 FCS_RBG.5 Random bit generation (combining noise sources) 10.4.11 FCS_RBG.6 Random bit generation service 10.5 Generation of random numbers (FCS_RNG) 10.5.1 Family behaviour |
58 | 10.5.2 Components leveling and description 10.5.3 Management of FCS_RNG.1 10.5.4 Audit of FCS_RNG.1 10.5.5 FCS_RNG.1 Random number generation 11.1 Class description |
60 | 11.2 Access control policy (FDP_ACC) 11.2.1 Family behaviour |
61 | 11.2.2 Components leveling and description 11.2.3 Management of FDP_ACC.1, FDP_ACC.2 11.2.4 Audit of FDP_ACC.1, FDP_ACC.2 11.2.5 FDP_ACC.1 Subset access control 11.2.6 FDP_ACC.2 Complete access control |
62 | 11.3 Access control functions (FDP_ACF) 11.3.1 Family behaviour 11.3.2 Components leveling and description 11.3.3 Management of FDP_ACF.1 11.3.4 Audit of FDP_ACF.1 11.3.5 FDP_ACF.1 Security attribute-based access control |
63 | 11.4 Data authentication (FDP_DAU) 11.4.1 Family behaviour 11.4.2 Components leveling and description 11.4.3 Management of FDP_DAU.1, FDP_DAU.2 11.4.4 Audit of FDP_DAU.1 |
64 | 11.4.5 Audit of FDP_DAU.2 11.4.6 FDP_DAU.1 Basic Data Authentication 11.4.7 FDP_DAU.2 Data Authentication with Identity of Guarantor 11.5 Export from the TOE (FDP_ETC) 11.5.1 Family behaviour |
65 | 11.5.2 Components leveling and description 11.5.3 Management of FDP_ETC.1 11.5.4 Management of FDP_ETC.2 11.5.5 Audit of FDP_ETC.1, FDP_ETC.2 11.5.6 FDP_ETC.1 Export of user data without security attributes 11.5.7 FDP_ETC.2 Export of user data with security attributes |
66 | 11.6 Information flow control policy (FDP_IFC) 11.6.1 Family behaviour 11.6.2 Components leveling and description |
67 | 11.6.3 Management of FDP_IFC.1, FDP_IFC.2 11.6.4 Audit of FDP_IFC.1, FDP_IFC.2 11.6.5 FDP_IFC.1 Subset information flow control 11.6.6 FDP_IFC.2 Complete information flow control 11.7 Information flow control functions (FDP_IFF) 11.7.1 Family behaviour |
68 | 11.7.2 Components leveling and description 11.7.3 Management of FDP_IFF.1, FDP_IFF.2 11.7.4 Management of FDP_IFF.3, FDP_IFF.4, FDP_IFF.5 |
69 | 11.7.5 Management of FDP_IFF.6 11.7.6 Audit of FDP_IFF.1, FDP_IFF.2, FDP_IFF.5 11.7.7 Audit of FDP_IFF.3, FDP_IFF.4, FDP_IFF.6 11.7.8 FDP_IFF.1 Simple security attributes |
70 | 11.7.9 FDP_IFF.2 Hierarchical security attributes |
71 | 11.7.10 FDP_IFF.3 Limited illicit information flows 11.7.11 FDP_IFF.4 Partial elimination of illicit information flows 11.7.12 FDP_IFF.5 No illicit information flows 11.7.13 FDP_IFF.6 Illicit information flow monitoring |
72 | 11.8 Information Retention Control (FDP_IRC) 11.8.1 Family behaviour 11.8.2 Components leveling and description |
73 | 11.8.3 Management of FDP_IRC.1 11.8.4 Audit of FDP_IRC.1 11.8.5 FDP_IRC.1 Information retention control 11.9 Import from outside of the TOE (FDP_ITC) 11.9.1 Family behaviour 11.9.2 Components leveling and description |
74 | 11.9.3 Management of FDP_ITC.1, FDP_ITC.2 11.9.4 Audit of FDP_ITC.1, FDP_ITC.2 11.9.5 FDP_ITC.1 Import of user data without security attributes 11.9.6 FDP_ITC.2 Import of user data with security attributes |
75 | 11.10 Internal TOE transfer (FDP_ITT) 11.10.1 Family behaviour 11.10.2 Components leveling and description 11.10.3 Management of FDP_ITT.1, FDP_ITT.2 |
76 | 11.10.4 Management of FDP_ITT.3, FDP_ITT.4 11.10.5 Audit of FDP_ITT.1, FDP_ITT.2 11.10.6 Audit of FDP_ITT.3, FDP_ITT.4 11.10.7 FDP_ITT.1 Basic internal transfer protection 11.10.8 FDP_ITT.2 Transmission separation by attribute |
77 | 11.10.9 FDP_ITT.3 Integrity monitoring 11.10.10 FDP_ITT.4 Attribute-based integrity monitoring 11.11 Residual information protection (FDP_RIP) 11.11.1 Family behaviour |
78 | 11.11.2 Components leveling and description 11.11.3 Management of FDP_RIP.1, FDP_RIP.2 11.11.4 Audit of FDP_RIP.1, FDP_RIP.2 11.11.5 FDP_RIP.1 Subset residual information protection 11.11.6 FDP_RIP.2 Full residual information protection |
79 | 11.12 Rollback (FDP_ROL) 11.12.1 Family behaviour 11.12.2 Components leveling and description 11.12.3 Management of FDP_ROL.1, FDP_ROL.2 11.12.4 Audit of FDP_ROL.1, FDP_ROL.2 11.12.5 FDP_ROL.1 Basic rollback |
80 | 11.12.6 FDP_ROL.2 Advanced rollback 11.13 Stored data confidentiality (FDP_SDC) 11.13.1 Family behaviour 11.13.2 Components leveling and description 11.13.3 Management of FDP_SDC.1, FDP_SDC.2 |
81 | 11.13.4 Audit of FDP_SDC.1, FDP_SDC.2 11.13.5 FDP_SDC.1 Stored data confidentiality 11.13.6 FDP_SDC.2 Stored data confidentiality with dedicated method 11.14 Stored data integrity (FDP_SDI) 11.14.1 Family behaviour 11.14.2 Components leveling and description |
82 | 11.14.3 Management of FDP_SDI.1 11.14.4 Management of FDP_SDI.2 11.14.5 Audit of FDP_SDI.1 11.14.6 Audit of FDP_SDI.2 11.14.7 FDP_SDI.1 Stored data integrity monitoring 11.14.8 FDP_SDI.2 Stored data integrity monitoring and action |
83 | 11.15 Inter-TSF user data confidentiality transfer protection (FDP_UCT) 11.15.1 Family behaviour 11.15.2 Components leveling and description 11.15.3 Management of FDP_UCT.1 11.15.4 Audit of FDP_UCT.1 11.15.5 FDP_UCT.1 Basic data exchange confidentiality |
84 | 11.16 Inter-TSF user data integrity transfer protection (FDP_UIT) 11.16.1 Family behaviour 11.16.2 Components leveling and description 11.16.3 Management of FDP_UIT.1, FDP_UIT.2, FDP_UIT.3 11.16.4 Audit of FDP_UIT.1 |
85 | 11.16.5 Audit of FDP_UIT.2, FDP_UIT.3 11.16.6 FDP_UIT.1 Data exchange integrity 11.16.7 FDP_UIT.2 Source data exchange recovery |
86 | 11.16.8 FDP_UIT.3 Destination data exchange recovery 12.1 Class description |
87 | 12.2 Authentication failures (FIA_AFL) 12.2.1 Family behaviour 12.2.2 Components leveling and description |
88 | 12.2.3 Management of FIA_AFL.1 12.2.4 Audit of FIA_AFL.1 12.2.5 FIA_AFL.1 Authentication failure handling 12.3 Authentication proof of identity (FIA_API) 12.3.1 Family behaviour 12.3.2 Components leveling and description 12.3.3 Management of FIA_API.1 |
89 | 12.3.4 Audit of FIA_API.1 12.3.5 FIA_API.1 Authentication proof of identity 12.4 User attribute definition (FIA_ATD) 12.4.1 Family behaviour 12.4.2 Components leveling and description 12.4.3 Management of FIA_ATD.1 12.4.4 Audit of FIA_ATD.1 12.4.5 FIA_ATD.1 User attribute definition |
90 | 12.5 Specification of secrets (FIA_SOS) 12.5.1 Family behaviour 12.5.2 Components leveling and description 12.5.3 Management of FIA_SOS.1 12.5.4 Management of FIA_SOS.2 12.5.5 Audit of FIA_SOS.1, FIA_SOS.2 12.5.6 FIA_SOS.1 Verification of secrets |
91 | 12.5.7 FIA_SOS.2 TSF Generation of secrets 12.6 User authentication (FIA_UAU) 12.6.1 Family behaviour 12.6.2 Components leveling and description |
92 | 12.6.3 Management of FIA_UAU.1 12.6.4 Management of FIA_UAU.2 12.6.5 Management of FIA_UAU.3, FIA_UAU.4, FIA_UAU.7 12.6.6 Management of FIA_UAU.5 12.6.7 Management of FIA_UAU.6 12.6.8 Management of FIA_UAU.7 12.6.9 Audit of FIA_UAU.1 |
93 | 12.6.10 Audit of FIA_UAU.2 12.6.11 Audit of FIA_UAU.3 12.6.12 Audit of FIA_UAU.4 12.6.13 Audit of FIA_UAU.5 12.6.14 Audit of FIA_UAU.6 12.6.15 Audit of FIA_UAU.7 12.6.16 FIA_UAU.1 Timing of authentication |
94 | 12.6.17 FIA_UAU.2 User authentication before any action 12.6.18 FIA_UAU.3 Unforgeable authentication 12.6.19 FIA_UAU.4 Single-use authentication mechanisms 12.6.20 FIA_UAU.5 Multiple authentication mechanisms |
95 | 12.6.21 FIA_UAU.6 Re-authenticating 12.6.22 FIA_UAU.7 Protected authentication feedback 12.7 User identification (FIA_UID) 12.7.1 Family behaviour 12.7.2 Components leveling and description |
96 | 12.7.3 Management of FIA_UID.1 12.7.4 Management of FIA_UID.2 12.7.5 Audit of FIA_UID.1, FIA_UID.2 12.7.6 FIA_UID.1 Timing of identification 12.7.7 FIA_UID.2 User identification before any action |
97 | 12.8 User-subject binding (FIA_USB) 12.8.1 Family behaviour 12.8.2 Components leveling and description 12.8.3 Management of FIA_USB.1 12.8.4 Audit of FIA_USB.1 12.8.5 FIA_USB.1 User-subject binding |
98 | 13.1 Class description |
99 | 13.2 Limited capabilities and availability (FMT_LIM) 13.2.1 Family behaviour 13.2.2 Components leveling and description |
100 | 13.2.3 Management of FMT_LIM.1, FMT_LIM.2 13.2.4 Audit of FMT_LIM.1 13.2.5 FMT_LIM.1 Limited capabilities 13.2.6 FMT_LIM.2 Limited availability 13.3 Management of functions in TSF (FMT_MOF) 13.3.1 Family behaviour 13.3.2 Components leveling and description |
101 | 13.3.3 Management of FMT_MOF.1 13.3.4 Audit of FMT_MOF.1 13.3.5 FMT_MOF.1 Management of security functions behaviour 13.4 Management of security attributes (FMT_MSA) 13.4.1 Family behaviour 13.4.2 Components leveling and description |
102 | 13.4.3 Management of FMT_MSA.1 13.4.4 Management of FMT_MSA.2 13.4.5 Management of FMT_MSA.3 13.4.6 Management of FMT_MSA.4 13.4.7 Audit of FMT_MSA.1 13.4.8 Audit of FMT_MSA.2 13.4.9 Audit of FMT_MSA.3 |
103 | 13.4.10 Audit of FMT_MSA.4 13.4.11 FMT_MSA.1 Management of security attributes 13.4.12 FMT_MSA.2 Secure security attributes 13.4.13 FMT_MSA.3 Static attribute initialization |
104 | 13.4.14 FMT_MSA.4 Security attribute value inheritance 13.5 Management of TSF data (FMT_MTD) 13.5.1 Family behaviour 13.5.2 Components leveling and description 13.5.3 Management of FMT_MTD.1 13.5.4 Management of FMT_MTD.2 |
105 | 13.5.5 Management of FMT_MTD.3 13.5.6 Audit of FMT_MTD.1 13.5.7 Audit of FMT_MTD.2 13.5.8 Audit of FMT_MTD.3 13.5.9 FMT_MTD.1 Management of TSF data 13.5.10 FMT_MTD.2 Management of limits on TSF data |
106 | 13.5.11 FMT_MTD.3 Secure TSF data 13.6 Revocation (FMT_REV) 13.6.1 Family behaviour 13.6.2 Components leveling and description 13.6.3 Management of FMT_REV.1 13.6.4 Audit of FMT_REV.1 13.6.5 FMT_REV.1 Revocation |
107 | 13.7 Security attribute expiration (FMT_SAE) 13.7.1 Family behaviour 13.7.2 Components leveling and description 13.7.3 Management of FMT_SAE.1 13.7.4 Audit of FMT_SAE.1 13.7.5 FMT_SAE.1 Time-limited authorization |
108 | 13.8 Specification of Management Functions (FMT_SMF) 13.8.1 Family behaviour 13.8.2 Components leveling and description 13.8.3 Management of FMT_SMF.1 13.8.4 Audit of FMT_SMF.1 13.8.5 FMT_SMF.1 Specification of Management Functions |
109 | 13.9 Security management roles (FMT_SMR) 13.9.1 Family behaviour 13.9.2 Components leveling and description 13.9.3 Management of FMT_SMR.1 13.9.4 Management of FMT_SMR.2 13.9.5 Management of FMT_SMR.3 13.9.6 Audit of FMT_SMR.1 13.9.7 Audit of FMT_SMR.2 |
110 | 13.9.8 Audit of FMT_SMR.3 13.9.9 FMT_SMR.1 Security roles 13.9.10 FMT_SMR.2 Restrictions on security roles 13.9.11 FMT_SMR.3 Assuming roles |
111 | 14.1 Class description 14.2 Anonymity (FPR_ANO) 14.2.1 Family behaviour 14.2.2 Components leveling and description |
112 | 14.2.3 Management of FPR_ANO.1, FPR_ANO.2 14.2.4 Audit of FPR_ANO.1, FPR_ANO.2 14.2.5 FPR_ANO.1 Anonymity 14.2.6 FPR_ANO.2 Anonymity without soliciting information 14.3 Pseudonymity (FPR_PSE) 14.3.1 Family behaviour 14.3.2 Components leveling and description |
113 | 14.3.3 Management of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3 14.3.4 Audit of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3 14.3.5 FPR_PSE.1 Pseudonymity 14.3.6 FPR_PSE.2 Reversible pseudonymity |
114 | 14.3.7 FPR_PSE.3 Alias pseudonymity 14.4 Unlinkability (FPR_UNL) 14.4.1 Family behaviour 14.4.2 Components leveling and description |
115 | 14.4.3 Management of FPR_UNL.1 14.4.4 Audit of FPR_UNL.1 14.4.5 FPR_UNL.1 Unlinkability of operations 14.5 Unobservability (FPR_UNO) 14.5.1 Family behaviour 14.5.2 Components leveling and description |
116 | 14.5.3 Management of FPR_UNO.1, FPR_UNO.2 14.5.4 Management of FPR_UNO.3 14.5.5 Management of FPR_UNO.4 14.5.6 Audit of FPR_UNO.1, FPR_UNO.2 14.5.7 Audit of FPR_UNO.3 14.5.8 Audit of FPR_UNO.4 |
117 | 14.5.9 FPR_UNO.1 Unobservability 14.5.10 FPR_UNO.2 Allocation of information impacting unobservability 14.5.11 FPR_UNO.3 Unobservability without soliciting information 14.5.12 FPR_UNO.4 Authorized user observability |
118 | 15.1 Class description |
120 | 15.2 TOE emanation (FPT_EMS) 15.2.1 Family behaviour |
121 | 15.2.2 Components leveling and description 15.2.3 Management of FPT_EMS.1 15.2.4 Audit of FPT_EMS.1 15.2.5 FPT_EMS.1 Emanation of TSF and User data 15.3 Fail secure (FPT_FLS) 15.3.1 Family behaviour |
122 | 15.3.2 Components leveling and description 15.3.3 Management of FPT_FLS.1 15.3.4 Audit of FPT_FLS.1 15.3.5 FPT_FLS.1 Failure with preservation of secure state 15.4 TSF initialization (FPT_INI) 15.4.1 Family behaviour 15.4.2 Components leveling and description |
123 | 15.4.3 Management of FPT_INI.1 15.4.4 Audit of FPT_INI.1 15.4.5 FPT_INI.1 TSF initialization 15.5 Availability of exported TSF data (FPT_ITA) 15.5.1 Family behaviour 15.5.2 Components leveling and description |
124 | 15.5.3 Management of FPT_ITA.1 15.5.4 Audit of FPT_ITA.1 15.5.5 FPT_ITA.1 Inter-TSF availability within a defined availability metric 15.6 Confidentiality of exported TSF data (FPT_ITC) 15.6.1 Family behaviour 15.6.2 Components leveling and description |
125 | 15.6.3 Management of FPT_ITC.1 15.6.4 Audit of FPT_ITC.1 15.6.5 FPT_ITC.1 Inter-TSF confidentiality during transmission 15.7 Integrity of exported TSF data (FPT_ITI) 15.7.1 Family behaviour 15.7.2 Components leveling and description 15.7.3 Management of FPT_ITI.1 |
126 | 15.7.4 Management of FPT_ITI.2 15.7.5 Audit of FPT_ITI.1 15.7.6 Audit of FPT_ITI.2 15.7.7 FPT_ITI.1 Inter-TSF detection of modification 15.7.8 FPT_ITI.2 Inter-TSF detection and correction of modification |
127 | 15.8 Internal TOE TSF data transfer (FPT_ITT) 15.8.1 Family behaviour 15.8.2 Components leveling and description 15.8.3 Management of FPT_ITT.1 15.8.4 Management of FPT_ITT.2 |
128 | 15.8.5 Management of FPT_ITT.3 15.8.6 Audit of FPT_ITT.1, FPT_ITT.2 15.8.7 Audit of FPT_ITT.3 15.8.8 FPT_ITT.1 Basic internal TSF data transfer protection 15.8.9 FPT_ITT.2 TSF data transfer separation |
129 | 15.8.10 FPT_ITT.3 TSF data integrity monitoring 15.9 TSF physical protection (FPT_PHP) 15.9.1 Family behaviour 15.9.2 Components leveling and description |
130 | 15.9.3 Management of FPT_PHP.1 15.9.4 Management of FPT_PHP.2 15.9.5 Management of FPT_PHP.3 15.9.6 Audit of FPT_PHP.1 15.9.7 Audit of FPT_PHP.2 15.9.8 Audit of FPT_PHP.3 15.9.9 FPT_PHP.1 Passive detection of physical attack |
131 | 15.9.10 FPT_PHP.2 Notification of physical attack 15.9.11 FPT_PHP.3 Resistance to physical attack 15.10 Trusted recovery (FPT_RCV) 15.10.1 Family behaviour 15.10.2 Components leveling and description |
132 | 15.10.3 Management of FPT_RCV.1 15.10.4 Management of FPT_RCV.2, FPT_RCV.3 15.10.5 Management of FPT_RCV.4 15.10.6 Audit of FPT_RCV.1, FPT_RCV.2, FPT_RCV.3 15.10.7 Audit of FPT_RCV.4 15.10.8 FPT_RCV.1 Manual recovery |
133 | 15.10.9 FPT_RCV.2 Automated recovery 15.10.10 FPT_RCV.3 Automated recovery without undue loss 15.10.11 FPT_RCV.4 Function recovery |
134 | 15.11 Replay detection (FPT_RPL) 15.11.1 Family behaviour 15.11.2 Components leveling and description 15.11.3 Management of FPT_RPL.1 15.11.4 Audit of FPT_RPL.1 15.11.5 FPT_RPL.1 Replay detection |
135 | 15.12 State synchrony protocol (FPT_SSP) 15.12.1 Family behaviour 15.12.2 Components leveling and description 15.12.3 Management of FPT_SSP.1, FPT_SSP.2 15.12.4 Audit of FPT_SSP.1, FPT_SSP.2 15.12.5 FPT_SSP.1 Simple trusted acknowledgement 15.12.6 FPT_SSP.2 Mutual trusted acknowledgement |
136 | 15.13 Time stamps (FPT_STM) 15.13.1 Family behaviour 15.13.2 Components leveling and description 15.13.3 Management of FPT_STM.1 15.13.4 Management of FPT_STM.2 15.13.5 Audit of FPT_STM.1 15.13.6 Audit of FPT_STM.2 |
137 | 15.13.7 FPT_STM.1 Reliable time stamps 15.13.8 FPT_STM.2 Time source 15.14 Inter-TSF TSF data consistency (FPT_TDC) 15.14.1 Family behaviour 15.14.2 Components leveling and description 15.14.3 Management of FPT_TDC.1 |
138 | 15.14.4 Audit of FPT_TDC.1 15.14.5 FPT_TDC.1 Inter-TSF basic TSF data consistency 15.15 Testing of external entities (FPT_TEE) 15.15.1 Family behaviour 15.15.2 Components leveling and description 15.15.3 Management of FPT_TEE.1 |
139 | 15.15.4 Audit of FPT_TEE.1 15.15.5 FPT_TEE.1 Testing of external entities 15.16 Internal TOE TSF data replication consistency (FPT_TRC) 15.16.1 Family behaviour 15.16.2 Components leveling and description 15.16.3 Management of FPT_TRC.1 |
140 | 15.16.4 Audit of FPT_TRC.1 15.16.5 FPT_TRC.1 Internal TSF consistency 15.17 TSF self-test (FPT_TST) 15.17.1 Family behaviour 15.17.2 Components leveling and description |
141 | 15.17.3 Management of FPT_TST.1 15.17.4 Audit of FPT_TST.1 15.17.5 FPT_TST.1 TSF self-testing 16.1 Class description |
142 | 16.2 Fault tolerance (FRU_FLT) 16.2.1 Family behaviour 16.2.2 Components leveling and description 16.2.3 Management of FRU_FLT.1, FRU_FLT.2 16.2.4 Audit of FRU_FLT.1 16.2.5 Audit of FRU_FLT.2 |
143 | 16.2.6 FRU_FLT.1 Degraded fault tolerance 16.2.7 FRU_FLT.2 Limited fault tolerance 16.3 Priority of service (FRU_PRS) 16.3.1 Family behaviour 16.3.2 Components leveling and description 16.3.3 Management of FRU_PRS.1, FRU_PRS.2 |
144 | 16.3.4 Audit of FRU_PRS.1, FRU_PRS.2 16.3.5 FRU_PRS.1 Limited priority of service 16.3.6 FRU_PRS.2 Full priority of service 16.4 Resource allocation (FRU_RSA) 16.4.1 Family behaviour 16.4.2 Components leveling and description |
145 | 16.4.3 Management of FRU_RSA.1 16.4.4 Management of FRU_RSA.2 16.4.5 Audit of FRU_RSA.1, FRU_RSA.2 16.4.6 FRU_RSA.1 Maximum quotas 16.4.7 FRU_RSA.2 Minimum and maximum quotas |
146 | 17.1 Class description 17.2 Limitation on scope of selectable attributes (FTA_LSA) 17.2.1 Family behaviour 17.2.2 Components leveling and description |
147 | 17.2.3 Management of FTA_LSA.1 17.2.4 Audit of FTA_LSA.1 17.2.5 FTA_LSA.1 Limitation on scope of selectable attributes 17.3 Limitation on multiple concurrent sessions (FTA_MCS) 17.3.1 Family behaviour 17.3.2 Components leveling and description |
148 | 17.3.3 Management of FTA_MCS.1 17.3.4 Management of FTA_MCS.2 17.3.5 Audit of FTA_MCS.1, FTA_MCS.2 17.3.6 FTA_MCS.1 Basic limitation on multiple concurrent sessions 17.3.7 FTA_MCS.2 Per user attribute limitation on multiple concurrent sessions |
149 | 17.4 Session locking and termination (FTA_SSL) 17.4.1 Family behaviour 17.4.2 Components leveling and description 17.4.3 Management of FTA_SSL.1 17.4.4 Management of FTA_SSL.2 17.4.5 Management of FTA_SSL.3 |
150 | 17.4.6 Management of FTA_SSL.4 17.4.7 Audit of FTA_SSL.1, FTA_SSL.2 17.4.8 Audit of FTA_SSL.3 17.4.9 Audit of FTA_SSL.4 17.4.10 FTA_SSL.1 TSF-initiated session locking 17.4.11 FTA_SSL.2 User-initiated locking |
151 | 17.4.12 FTA_SSL.3 TSF-initiated termination 17.4.13 FTA_SSL.4 User-initiated termination 17.5 TOE access banners (FTA_TAB) 17.5.1 Family behaviour 17.5.2 Components leveling and description 17.5.3 Management of FTA_TAB.1 |
152 | 17.5.4 Audit of FTA_TAB.1 17.5.5 FTA_TAB.1 Default TOE access banners 17.6 TOE access history (FTA_TAH) 17.6.1 Family behaviour 17.6.2 Components leveling and description 17.6.3 Management of FTA_TAH.1 17.6.4 Audit of FTA_TAH.1 17.6.5 FTA_TAH.1 TOE access history |
153 | 17.7 TOE session establishment (FTA_TSE) 17.7.1 Family behaviour 17.7.2 Components leveling and description 17.7.3 Management of FTA_TSE.1 17.7.4 Audit of FTA_TSE.1 17.7.5 FTA_TSE.1 TOE session establishment |
154 | 18.1 Class description |
155 | 18.2 Inter-TSF trusted channel (FTP_ITC) 18.2.1 Family behaviour 18.2.2 Components leveling and description 18.2.3 Management of FTP_ITC.1 18.2.4 Audit of FTP_ITC.1 18.2.5 FTP_ITC.1 Inter-TSF trusted channel |
156 | 18.3 Trusted channel protocol (FTP_PRO) 18.3.1 Family behavior 18.3.2 Components leveling and description 18.3.3 Management of FTP_PRO.1 18.3.4 Management of FTP_PRO.2 18.3.5 Management of FTP_PRO.3 |
157 | 18.3.6 Audit of FTP_PRO.1 18.3.7 Audit of FTP_PRO.2 18.3.8 Audit of FTP_PRO.3 18.3.9 FTP_PRO.1 Trusted channel protocol |
158 | 18.3.10 FTP_PRO.2 Trusted channel establishment 18.3.11 FTP_PRO.3 Trusted channel data protection |
159 | 18.4 Trusted path (FTP_TRP) 18.4.1 Family behaviour 18.4.2 Components leveling and description 18.4.3 Management of FTP_TRP.1 18.4.4 Audit of FTP_TRP.1 18.4.5 FTP_TRP.1 Trusted path |