BS ISO/IEC 15408-4:2022
$142.49
Information security, cybersecurity and privacy protection. Evaluation criteria for IT security – Framework for the specification of evaluation methods and activities
Published By | Publication Date | Number of Pages |
BSI | 2022 | 28 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
6 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions 4 General model of evaluation methods and evaluation activities 4.1 Concepts and model |
11 | 4.2 Deriving evaluation methods and evaluation activities |
13 | 4.3 Verb usage in the description of evaluation methods and evaluation activities |
14 | 4.4 Conventions for the description of evaluation methods and evaluation activities 5 Structure of an evaluation method 5.1 Overview |
15 | 5.2 Specification of an evaluation method 5.2.1 Overview |
16 | 5.2.2 Identification of evaluation methods |
17 | 5.2.3 Entity responsible for the evaluation method 5.2.4 Scope of the evaluation method 5.2.5 Dependencies 5.2.6 Required input from the developer or other entities |
18 | 5.2.7 Required tool types 5.2.8 Required evaluator competences 5.2.9 Requirements for reporting 5.2.10 Rationale for the evaluation method |
20 | 5.2.11 Additional verb definitions 5.2.12 Set of evaluation activities 6 Structure of evaluation activities 6.1 Overview 6.2 Specification of an evaluation activity 6.2.1 Unique identification of the evaluation activity 6.2.2 Objective of the evaluation activity |
21 | 6.2.3 Evaluation activity links to SFRs, SARs, and other evaluation activities 6.2.4 Required input from the developer or other entities 6.2.5 Required tool types 6.2.6 Required evaluator competences 6.2.7 Assessment strategy |
22 | 6.2.8 Pass/fail criteria |
23 | 6.2.9 Requirements for reporting 6.2.10 Rationale for the evaluation activity |
24 | Bibliography |