BS ISO/IEC 15408-1:2022
$215.11
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security – Part 1: Introduction and general model
Published By | Publication Date | Number of Pages |
BSI | 2022 | 156 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
8 | Foreword |
10 | Introduction |
13 | 1 Scope 2 Normative references |
14 | 3 Terms and definitions |
25 | 4 Abbreviated terms |
27 | 5 Overview 5.1 General 5.2 ISO/IEC 15408 series description 5.2.1 General |
28 | 5.2.2 Audience |
31 | 5.3 Target of evaluation (TOE) 5.3.1 General 5.3.2 TOE boundaries |
32 | 5.3.3 Different representations of the TOE 5.3.4 Different configurations of the TOE 5.3.5 Operational environment of the TOE |
33 | 5.4 Presentation of material in this document 6 General model 6.1 Background 6.2 Assets and security controls |
36 | 6.3 Core constructs of the paradigm of the ISO/IEC 15408 series 6.3.1 General 6.3.2 Conformance types 6.3.3 Communicating security requirements |
39 | 6.3.4 Meeting the needs of consumers (risk owners) |
41 | 7 Specifying security requirements 7.1 Security problem definition (SPD) 7.1.1 General 7.1.2 Threats |
42 | 7.1.3 Organizational security policies (OSPs) 7.1.4 Assumptions |
43 | 7.2 Security objectives 7.2.1 General 7.2.2 Security objectives for the TOE 7.2.3 Security objectives for the operational environment |
44 | 7.2.4 Relation between security objectives and the SPD 7.2.5 Tracing between security objectives and the SPD |
45 | 7.2.6 Providing a justification for the tracing 7.2.7 On countering threats 7.2.8 Security objectives: conclusion 7.3 Security requirements 7.3.1 General |
46 | 7.3.2 Security Functional Requirements (SFRs) |
48 | 7.3.3 Security assurance requirements (SARs) |
49 | 7.3.4 Security requirements: conclusion |
50 | 8 Security components 8.1 Hierarchical structure of security components 8.1.1 General 8.1.2 Class |
51 | 8.1.3 Family 8.1.4 Component 8.1.5 Element 8.2 Operations 8.2.1 General |
52 | 8.2.2 Iteration 8.2.3 Assignment |
53 | 8.2.4 Selection |
55 | 8.2.5 Refinement |
56 | 8.3 Dependencies between components 8.4 Extended components 8.4.1 General |
57 | 8.4.2 Defining extended components 9 Packages 9.1 General |
58 | 9.2 Package types 9.2.1 General 9.2.2 Assurance packages |
59 | 9.2.3 Functional packages 9.3 Package dependencies 9.4 Evaluation method(s) and activities |
60 | 10 Protection Profiles (PPs) 10.1 General 10.2 PP introduction 10.3 Conformance claims and conformance statements |
63 | 10.4 Security assurance requirements (SARs) 10.5 Additional requirements common to strict and demonstrable conformance 10.5.1 Conformance claims and conformance statements 10.5.2 Security problem definition (SPD) |
64 | 10.5.3 Security objectives 10.6 Additional requirements specific to strict conformance 10.6.1 Requirements for the security problem definition (SPD) 10.6.2 Requirements for the security objectives 10.6.3 Requirements for the security requirements |
65 | 10.7 Additional requirements specific to demonstrable conformance 10.8 Additional requirements specific to exact conformance 10.8.1 General 10.8.2 Conformance claims and statements |
66 | 10.9 Using PPs 10.10 Conformance statements and claims in the case of multiple PPs 10.10.1 General 10.10.2 Where strict or demonstrable conformance is specified 10.10.3 Where exact conformance is specified 11 Modular requirements construction 11.1 General |
67 | 11.2 PP-Modules 11.2.1 General 11.2.2 PP-Module Base 11.2.3 Requirements for PP-Modules |
71 | 11.3 PP-Configurations 11.3.1 General 11.3.2 Requirements for PP-Configurations |
77 | 11.3.3 Usage of PP-Configurations |
80 | 12 Security Targets (STs) 12.1 General 12.2 Conformance claims and statements |
83 | 12.3 Assurance requirements 12.4 Additional requirements in the exact conformance case 12.4.1 Additional requirements for the conformance claim 12.4.2 Additional requirements for the SPD |
84 | 12.4.3 Additional requirements for the security objectives 12.4.4 Additional requirements for the security requirements 12.5 Additional requirements in the multi-assurance case |
86 | 13 Evaluation and evaluation results 13.1 General |
88 | 13.2 Evaluation context |
89 | 13.3 Evaluation of PPs and PP-Configurations 13.4 Evaluation of STs 13.5 Evaluation of TOEs |
90 | 13.6 Evaluation methods and evaluation activities 13.7 Evaluation results 13.7.1 Results of a PP evaluation 13.7.2 Results of a PP-Configuration evaluation 13.7.3 Results of a ST/TOE evaluation |
91 | 13.8 Multi-assurance evaluation |
92 | 14 Composition of assurance 14.1 General |
93 | 14.2 Composition models 14.2.1 Layered composition model |
94 | 14.2.2 Network or bi-directional composition model 14.2.3 Embedded composition model |
95 | 14.3 Evaluation techniques for providing assurance in composition models 14.3.1 General 14.3.2 ACO class for composed TOEs |
96 | 14.3.3 Composite evaluation for composite products |
107 | 14.4 Requirements for evaluations using composition techniques 14.4.1 Re-use of evaluation results |
108 | 14.4.2 Composition evaluation issues |
109 | 14.5 Evaluation by composition and multi-assurance |
110 | Annex A (normative) Specification of packages |
114 | Annex B (normative) Specification of Protection Profiles (PPs) |
124 | Annex C (normative) Specification of PP-Modules and PP-Configurations |
137 | Annex D (normative) Specification of Security Targets (STs) and Direct Rationale STs |
148 | Annex E (normative) PP/PP-Configuration conformance |
153 | Bibliography |