ISO/IEC 18045:2008
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Methodology for IT security evaluation
Hardcopy , PDF
French, English
19-08-2008
09-04-2025
ISO/IEC 18045:2008 is a companion document to ISO/IEC 15408, Information technology - Security techniques - Evaluation criteria for IT security. ISO/IEC 18045:2008 defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 evaluation, using the criteria and evaluation evidence defined in ISO/IEC 15408. ISO/IEC 18045:2008 does not define evaluator actions for certain high assurance ISO/IEC 15408 components, where there is as yet no generally agreed guidance.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
317
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| Supersedes |
| Standards | Relationship |
| DS/EN ISO/IEC 18045:2020 | Identical |
| ÖVE/ÖNORM EN ISO/IEC 18045:2021 02 01 | Identical |
| EN ISO/IEC 18045:2020 | Identical |
| BIS IS 15671 : 2016 | Identical |
| BS ISO/IEC 18045:2008 | Identical |
| NEN ISO/IEC 18045 : 2011 + COR 2014 | Identical |
| GOST R ISO/IEC 18045 : 2008 | Identical |
| EN ISO/IEC 18045:2020 | Identical |
| SS-EN ISO/IEC 18045:2020 | Identical |
| I.S. EN ISO/IEC 18045:2020 | Identical |
| NEN-EN-ISO/IEC 18045:2020 | Identical |
| NS-EN ISO/IEC 18045:2020 | Identical |
| CEI UNI EN ISO/IEC 18045:2020 | Identical |
| BS EN ISO/IEC 18045:2020 | Identical |
| PN-EN ISO/IEC 18045:2020-09 | Identical |
| PN ISO/IEC 18045 : 2016 | Identical |
| SAC GB/T 30270 : 2013 | Identical |
| UNE-EN ISO/IEC 18045:2020 | Identical |
| INCITS/ISO/IEC 18045 : 2008(R2018) | Identical |
| DIN EN 419251-3:2013-06 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
| BS EN 419251-2:2013 | Security requirements for device for authentication Protection profile for extension for trusted channel to certificate generation application |
| BS ISO/IEC 19896-1:2018 | IT security techniques. Competence requirements for information security testers and evaluators Introduction, concepts and general requirements |
| ISO/IEC TR 20004:2015 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
| BS EN 50436-6:2015 | Alcohol interlocks. Test methods and performance requirements Data security |
| ISO/IEC TS 19249:2017 | Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications |
| BS ISO/IEC 30107-3:2017 | Information technology. Biometric presentation attack detection Testing and reporting |
| BS ISO/IEC 15408-1:2009 | Information technology. Security techniques. Evaluation criteria for IT Security Part 1: Introduction and general model |
| PD ISO/IEC TR 15443-1:2012 | Information technology. Security techniques. Security assurance framework Introduction and concepts |
| I.S. EN 50436-6:2015 | ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
| EN 50436-6:2015 | Alcohol interlocks - Test methods and performance requirements - Part 6: Data security |
| 16/30329605 DC : 0 | BS ISO/IEC 30107-3 - INFORMATION TECHNOLOGY - BIOMETRIC PRESENTATION ATTACK DETECTION - PART 3: TESTING AND REPORTING |
| ISO/IEC 30107-3:2017 | Information technology — Biometric presentation attack detection — Part 3: Testing and reporting |
| 15/30279952 DC : 0 | BS ISO/IEC 30124 - CODE OF PRACTICE FOR THE IMPLEMENTATION OF A BIOMETRIC SYSTEM |
| BS EN 419251-1:2013 | Security requirements for device for authentication Protection profile for core functionality |
| 08/30133461 DC : 0 | ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
| 13/30277648 DC : 0 | BS EN 50436-6 - ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
| ISO/IEC TR 15446:2017 | Information technology — Security techniques — Guidance for the production of protection profiles and security targets |
| BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
| INCITS/ISO/IEC 15408-1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
| ISO/IEC TS 20540:2018 | Information technology — Security techniques — Testing cryptographic modules in their operational environment |
| BIS IS 14990-1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
| ISO/IEC 18367:2016 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing |
| DIN EN 419251-2:2013-06 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
| PD ISO/IEC TR 15443-3:2007 | Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
| PD ISO/IEC TS 30104:2015 | Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements |
| DIN EN 419251-1:2013-05 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
| ISO/IEC TR 19791:2010 | Information technology — Security techniques — Security assessment of operational systems |
| ISO/IEC TR 15443-3:2007 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods |
| OLF 112-2 : 2013 | DEPLOYMENT OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE OIL AND GAS INDUSTRY - PART 2: ARCHITECTURE AND INTEGRATION |
| PD ISO/IEC TR 20004:2015 | Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
| BS EN 419251-3:2013 | Security requirements for device for authentication Additional functionality for security targets |
| ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
| I.S. EN 419251-2:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
| ISO/IEC TR 15443-1:2012 | Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts |
| 03/652496 DC : DRAFT JUNE 2003 | ISO/IEC TR 15443-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 1: OVERVIEW AND FRAMEWORK |
| PD ISO/IEC TR 15446:2009 | Information technology. Security techniques. Guide for the production of protection profiles and security targets |
| 15/30279582 DC : 0 | BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
| PD ISO/IEC/TR 19249:2017 | Information technology. Security techniques Catalogue of architectural and design principles for secure products, systems and applications |
| ISO/IEC TS 30104:2015 | Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements |
| EN 419251-2:2013 | Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
| EN 419251-3:2013 | Security requirements for device for authentication - Part 3: Additional functionality for security targets |
| EN 419251-1:2013 | Security requirements for device for authentication - Part 1: Protection profile for core functionality |
| PREN 50436-6 : DRAFT 2013 | ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
| 17/30351732 DC : 0 | BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS |
| 07/30167505 DC : 0 | BS ISO/IEC 15408-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1 - INTRODUCTION AND GENERAL MODEL |
| ISO/IEC 19896-1:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements |
| I.S. EN 419251-3:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
| I.S. EN 419251-1:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
| INCITS/ISO/IEC TR 15446:2017 (2020) | Information technology — Security techniques — Guidance for the production of protection profiles and security targets |
| UNE 71510:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL1». |
| UNE 71512:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL1» |
| UNE 71513:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL3» |
| UNE 71511:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL3» |
| UNE-ISO/IEC TR 15446:2013 IN | Information technology. Security techniques. Guide for the production of Protection Profiles and Security Targets |
| UNE-ISO/IEC TR 19791:2013 IN | Information technology. Security techniques. Security assessment of operational systems |
| INCITS/ISO/IEC 19896-1:2018(2019) | IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements<br> |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.