INCITS/ISO/IEC 15408-1 : 2012
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL
Hardcopy , PDF
19-04-2024
English
01-01-2012
Foreword
Introduction
2 Normative references
3 Terms and definitions
4 Abbreviated terms
5 Overview
6 General model
7 Tailoring Security Requirements
8 Protection Profiles and Packages
9 Evaluation results
Annex A (informative) - Specification
of Security Targets
Annex B (informative) - Specification of
Protection Profiles
Annex C (informative) - Guidance for
Operations
Annex D (informative) - PP conformance
Bibliography
Gives the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.
Committee |
CS1
|
DocumentType |
Standard
|
Pages |
74
|
PublisherName |
Information Technology Industry Council
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO/IEC 15408-1:2009 | Identical |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
IEEE 610.12-1990 | IEEE Standard Glossary of Software Engineering Terminology |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 15292:2001 | Information technology - Security techniques - Protection Profile registration procedures |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC TR 19791:2010 | Information technology Security techniques Security assessment of operational systems |
ISO/IEC TR 15446:2017 | Information technology Security techniques Guidance for the production of protection profiles and security targets |
ISO/IEC 18045:2008 | Information technology — Security techniques — Methodology for IT security evaluation |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.