• CSA ISO/IEC TR 15443-1 : 2015

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSURANCE FRAMEWORK - PART 1: INTRODUCTION AND CONCEPTS

    Available format(s):  Hardcopy, PDF

    Superseded date:  07-02-2020

    Language(s):  English

    Published date:  01-01-2015

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Abbreviated Terms
    5 Concepts of security assurance
    6 The structure of security assurance
    7 SACA techniques
    8 SACA methods
    9 CASCO
    10 SACA Paradigms
    11 Aspects of the composition of security assurance
    Bibliography

    Abstract - (Show below) - (Hide below)

    Specifies terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles central to ISO/IEC TR 15443 across its user communities.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Canadian Standards Association
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 17025:2005 General requirements for the competence of testing and calibration laboratories
    ISO/IEC 17000:2004 Conformity assessment Vocabulary and general principles
    ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
    ISO/IEC 17021:2011 Conformity assessment Requirements for bodies providing audit and certification of management systems
    ISO/IEC 23988:2007 Information technology — A code of practice for the use of information technology (IT) in the delivery of assessments
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
    ISO/IEC TR 15026-1:2010 Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary
    ISO/IEC 17030:2003 Conformity assessment General requirements for third-party marks of conformity
    ISO/IEC 17020:2012 Conformity assessment — Requirements for the operation of various types of bodies performing inspection
    ISO/IEC TR 19791:2010 Information technology Security techniques Security assessment of operational systems
    ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
    ISO/IEC 15026-2:2011 Systems and software engineering — Systems and software assurance — Part 2: Assurance case
    ISO/PAS 17005:2008 Conformity assessment Use of management systems Principles and requirements
    ISO/IEC 27036-1:2014 Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts
    ISO/IEC 17024:2012 Conformity assessment — General requirements for bodies operating certification of persons
    ISO/IEC 17007:2009 Conformity assessment — Guidance for drafting normative documents suitable for use for conformity assessment
    ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation
    ISO/IEC 15026-3:2015 Systems and software engineering — Systems and software assurance — Part 3: System integrity levels
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective