PD ISO/IEC TR 15443-1:2012
Current
The latest, up-to-date edition.
Information technology. Security techniques. Security assurance framework Introduction and concepts
Hardcopy , PDF
English
31-10-2013
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated Terms
5 Concepts of security assurance
6 The structure of security assurance
7 SACA techniques
8 SACA methods
9 CASCO
10 SACA Paradigms
11 Aspects of the composition of security assurance
Bibliography
Specifies terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles central to ISO/IEC TR 15443 across its user communities.
Committee |
IST/33
|
DevelopmentNote |
Supersedes 03/652496 DC. (03/2005)
|
DocumentType |
Standard
|
Pages |
64
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles central to ISO/IEC TR 15443 across its user communities. It provides information fundamental to users of ISO/IEC TR 15443-2.
Standards | Relationship |
ISO/IEC TR 15443-1:2012 | Identical |
ISO/IEC 17025:2005 | General requirements for the competence of testing and calibration laboratories |
ISO/IEC 17000:2004 | Conformity assessment Vocabulary and general principles |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC 17021:2011 | Conformity assessment Requirements for bodies providing audit and certification of management systems |
ISO/IEC 23988:2007 | Information technology — A code of practice for the use of information technology (IT) in the delivery of assessments |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC TR 15026-1:2010 | Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
ISO/IEC 17030:2003 | Conformity assessment General requirements for third-party marks of conformity |
ISO/IEC 17020:2012 | Conformity assessment — Requirements for the operation of various types of bodies performing inspection |
ISO/IEC TR 19791:2010 | Information technology Security techniques Security assessment of operational systems |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
ISO/IEC 15026-2:2011 | Systems and software engineering — Systems and software assurance — Part 2: Assurance case |
ISO/PAS 17005:2008 | Conformity assessment Use of management systems Principles and requirements |
ISO/IEC 27036-1:2014 | Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts |
ISO/IEC 17024:2012 | Conformity assessment — General requirements for bodies operating certification of persons |
ISO/IEC 17007:2009 | Conformity assessment — Guidance for drafting normative documents suitable for use for conformity assessment |
ISO/IEC 18045:2008 | Information technology — Security techniques — Methodology for IT security evaluation |
ISO/IEC 15026-3:2015 | Systems and software engineering — Systems and software assurance — Part 3: System integrity levels |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.