• EG 202 387 : 1.1.1

    Current The latest, up-to-date edition.

    TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date: 

    Publisher:  European Telecommunications Standards Institute

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    Introduction
    1 Scope
    2 References
    3 Definitions and abbreviations
      3.1 Definitions
      3.2 Abbreviations
    4 Security in standardization
      4.1 Communications security model
      4.2 Standards review and evaluation
      4.3 Overall development process
      4.4 Protocol standards containing security-related requirements
    5 Overview of ISO/IEC 15408
      5.1 Introduction to the Common Criteria (CC)
      5.2 Overview of CC documents
      5.3 ETSI standards in the evaluation of CC
    6 Evaluation components in ISO/IEC-15408-3
      6.1 Introduction
      6.2 Configuration management
      6.3 Delivery and operation
      6.4 Development
      6.5 Guidance documents
      6.6 Life cycle support
      6.7 Tests
      6.8 Vulnerability assessment
      6.9 Maintenance of assurance
    Annex A (normative): Functional components in ISO/IEC-15408-2
          A.1 Introduction
          A.2 Security audit
          A.3 Communication
          A.4 Cryptographic support
          A.5 User data protection
          A.6 Identification and authentication
          A.7 Security management
          A.8 Privacy
          A.9 Protection of the TSF
          A.10 Resource utilization
          A.11 TOE Access
          A.12 Trusted path/channels
    Annex B (normative): Protocol Implementation Conformance
            Statement (PICS)
    Annex C (informative): Bibliography
    History

    Abstract - (Show below) - (Hide below)

    Provides guidance to standards authors (rapporteurs and contributors) on the scope and application of the Common Criteria for Information Technology Security Evaluation and how ETSI standards may be developed to meet the goals and objectives of the Common Criteria.

    General Product Information - (Show below) - (Hide below)

    Committee TISPAN 07
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    TR 102 764 : 1.1.1 EHEALTH; ARCHITECTURE; ANALYSIS OF USER SERVICE MODELS, TECHNOLOGIES AND APPLICATIONS SUPPORTING EHEALTH
    TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
    EG 202 549 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES
    TR 103 303 : 1.1.1 CYBER; PROTECTION MEASURES FOR ICT IN THE CONTEXT OF CRITICAL INFRASTRUCTURE
    TR 102 420 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY
    TR 187 020 : 1.1.1 RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436
    GS NFV-SEC 006 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS
    ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
    SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
    TR 187 011 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES
    TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
    TR 187 002 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS
    TS 187 016 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE)
    ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
    TS 102 556 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE

    Standards Referencing This Book - (Show below) - (Hide below)

    EG 201 383 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS) - USE OF SDL IN ETSI DELIVERABLES - GUIDELINES FOR FACILITATING VALIDATION AND THE DEVELOPMENT OF CONFORMANCE TESTS
    TS 102 165-2 : 4.2.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES
    TS 102 237-1 : 4.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; INTEROPERABILITY TEST METHODS AND APPROACHES; PART 1: GENERIC APPROACH TO INTEROPERABILITY TESTING
    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
    ETR 232 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY
    ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
    EG 201 015 : 2.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); STANDARDS ENGINEERING PROCESS; A HANDBOOK OF VALIDATION METHODS
    ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
    ETR 237 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
    EG 202 107 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS) - PLANNING FOR VALIDATION AND TESTING IN THE STANDARDS-MAKING PROCESS
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
    EG 202 106 : 2.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); GUIDELINES FOR THE USE OF FORMAL SDL AS A DESCRIPTIVE TOOL
    ETR 184 : 20001 METHODS FOR TESTING AND SPECIFICATION (MTS); OVERVIEW OF VALIDATION TECHNIQUES FOR EUROPEAN TELECOMMUNICATION STANDARDS (ETSS) CONTAINING SDL
    EG 201 058 : 1.2.4 METHODS FOR TESTING AND SPECIFICATION (MTS); IMPLEMENTATION CONFORMANCE STATEMENT (ICS) PROFORMA STYLE GUIDE
    TR 101 052 : 1.1.1 SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD AUTHENTICATION AND KEY MANAGEMENT ALGORITHM SET TAA1
    EG 201 872 : 1.2.1 METHODS FOR TESTING AND SPECIFICATIONS; METHODOLOGICAL APPROACH TO THE USE OF OBJECT-ORIENTATION DESIGN IN THE STANDARDS MAKING PROCESS
    ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
    EN 300 396-6 : 1.5.1 TERRESTRIAL TRUNKED RADIO (TETRA); DIRECT MODE OPERATION (DMO); PART 6: SECURITY
    ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
    SR 001 262 : 2.0.0 ETSI DRAFTING RULES
    ETS 300 406 : 20001 METHODS FOR TESTING AND SPECIFICATION (MTS) - PROTOCOL AND PROFILE CONFORMANCE TESTING SPECIFICATIONS - STANDARDIZATION METHODOLOGY
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    ETR 332 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
    EN 300 392-7 : 3.3.1 TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective