INCITS/ISO/IEC 15292 : 2001
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES
Hardcopy , PDF
23-07-2013
English
01-01-2007
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
5 Technical Specifications
5.1 Entry label
5.2 Technical definition (within a register entry)
6 The JTC 1 Registration Authority for PPs and packages
6.1 Appointment
6.2 Qualifications
6.3 Contract
6.4 Duties
7 Criteria for eligibility of applicants for registration
8 Information to be included within an application for
registration
9 Steps involved in review and response to an application
9.1 Initial processing
9.2 Validation
10 Criteria for rejection of applications for registration
11 Operation of the register
11.1 Notification of obsolescent entries
11.2 Update of draft technical specifications
11.3 Routine review of entries
11.4 Defect notification
11.5 Other requests for update of entries
11.6 Deletion of register entries
12 Maintenance of the register
13 Confidentiality of information held within the register
14 Publication of the register
15 Appeals procedure
Annex A (informative) Benefits of registration
Annex B (informative) Lifecycle of a register entry
Defines the procedures to be applied by the JTC 1 Registration Authority appointed by the ISO and IEC councils to maintain a register of Protection Profiles and packages for the purposes of IT security evaluation.
DocumentType |
Standard
|
Pages |
20
|
ProductNote |
Reconfirmed 2001
|
PublisherName |
Information Technology Industry Council
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
ISO/IEC 15292:2001 | Identical |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.