• CSA ISO/IEC 15408-1 : 2010 : R2015

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL

    Available format(s):  Hardcopy, PDF

    Superseded date:  31-08-2020

    Language(s):  English

    Published date:  01-01-2015

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Abbreviated terms
    5 Overview
    6 General model
    7 Tailoring Security Requirements
    8 Protection Profiles and Packages
    9 Evaluation results
    Annex A (informative) - Specification of Security Targets
    Annex B (informative) - Specification of Protection Profiles
    Annex C (informative) - Guidance for Operations
    Annex D (informative) - PP conformance
    Bibliography

    Abstract - (Show below) - (Hide below)

    Sets up the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the International Standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Product Note Reconfirmed EN
    Publisher Canadian Standards Association
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
    IEEE 610.12-1990 IEEE Standard Glossary of Software Engineering Terminology
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    ISO/IEC 15292:2001 Information technology - Security techniques - Protection Profile registration procedures
    ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
    ISO/IEC TR 19791:2010 Information technology Security techniques Security assessment of operational systems
    ISO/IEC TR 15446:2017 Information technology Security techniques Guidance for the production of protection profiles and security targets
    ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective