• There are no items in your cart

INCITS/ISO/IEC 15292 : 2001

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES

Available format(s)

Hardcopy , PDF

Superseded date

23-07-2013

Language(s)

English

Published date

01-01-2007

1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
5 Technical Specifications
   5.1 Entry label
   5.2 Technical definition (within a register entry)
6 The JTC 1 Registration Authority for PPs and packages
   6.1 Appointment
   6.2 Qualifications
   6.3 Contract
   6.4 Duties
7 Criteria for eligibility of applicants for registration
8 Information to be included within an application for
   registration
9 Steps involved in review and response to an application
   9.1 Initial processing
   9.2 Validation
10 Criteria for rejection of applications for registration
11 Operation of the register
   11.1 Notification of obsolescent entries
   11.2 Update of draft technical specifications
   11.3 Routine review of entries
   11.4 Defect notification
   11.5 Other requests for update of entries
   11.6 Deletion of register entries
12 Maintenance of the register
13 Confidentiality of information held within the register
14 Publication of the register
15 Appeals procedure
Annex A (informative) Benefits of registration
Annex B (informative) Lifecycle of a register entry

Defines the procedures to be applied by the JTC 1 Registration Authority appointed by the ISO and IEC councils to maintain a register of Protection Profiles and packages for the purposes of IT security evaluation.

DocumentType
Standard
Pages
20
ProductNote
Reconfirmed 2001
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 15292:2001 Identical

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.