• CSA ISO/IEC TR 15446 : 2010

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS

    Available format(s):  Hardcopy, PDF

    Superseded date:  09-07-2021

    Language(s):  English

    Published date:  01-01-2015

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Abbreviations
    5 Purpose and structure of this technical report
    6 An overview of PPs and STs
    7 Specifying the PP/ST introduction
    8 Specifying conformance claims
    9 Specifying the security problem definition
    10 Specifying the security objectives
    11 Specifying extended component definitions
    12 Specifying the security requirements
    13 The TOE summary specification
    14 Specifying PP/STs for composed and component TOEs
    15 Special cases
    16 Use of automated tools
    Annex A (informative) - Example for the definition of an
            extended component
    Bibliography
    Index

    Abstract - (Show below) - (Hide below)

    Specifies guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Product Note Reconfirmed EN
    Publisher Canadian Standards Association
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    ISO/IEC 15292:2001 Information technology - Security techniques - Protection Profile registration procedures
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective