• PD ISO/IEC TR 15446:2009

    Current The latest, up-to-date edition.

    Information technology. Security techniques. Guide for the production of protection profiles and security targets

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  30-09-2009

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Abbreviated terms
    5 Purpose and structure of this document
    6 Overview of PPs and STs
    7 Specifying the PP/ST introduction
    8 Specifying conformance claims
    9 Specifying the security problem definition
    10 Specifying the security objectives
    11 Specifying extended component definitions
    12 Specifying the security requirements
    13 The TOE summary specification
    14 Specifying PP/STs for composed and component TOEs
    15 Special cases
    16 Use of automated tools
    Annex A (informative) - Example for the definition of an
            extended component
    Annex B (informative) - Example for the specification
            of refinements
    Bibliography

    Abstract - (Show below) - (Hide below)

    Gives guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408 (all parts).

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/3
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective