• There are no items in your cart

BS ISO/IEC 15408-1:2009

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology. Security techniques. Evaluation criteria for IT Security Part 1: Introduction and general model

Available format(s)

Hardcopy , PDF

Superseded date

31-10-2022

Superseded by

BS ISO/IEC 15408-1:2022

Language(s)

English

Published date

31-01-2010

€327.21
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms
5 Overview
6 General model
7 Tailoring Security Requirements
8 Protection Profiles and Packages
9 Evaluation results
Annex A (informative) - Specification of Security Targets
Annex B (informative) - Specification of Protection Profiles
Annex C (informative) - Guidance for Operations
Annex D (informative) - PP conformance
Bibliography

Specifies the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.

Committee
IST/33/3
DevelopmentNote
Supersedes 98/652414 DC (05/2005) Supersedes 04/30108735 DC (11/2005) Supersedes 07/30167505 DC. (07/2012)
DocumentType
Standard
Pages
76
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 15408-1:2009 Identical

17/30351843 DC : 0 BS 10754-1 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - PART 1 - GOVERNANCE AND MANAGEMENT SPECIFICATION

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
IEEE 610.12-1990 IEEE Standard Glossary of Software Engineering Terminology
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 15292:2001 Information technology - Security techniques - Protection Profile registration procedures
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC TR 19791:2010 Information technology Security techniques Security assessment of operational systems
ISO/IEC TR 15446:2017 Information technology Security techniques Guidance for the production of protection profiles and security targets
ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.