{"id":408146,"date":"2024-10-20T05:29:14","date_gmt":"2024-10-20T05:29:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-15408-12022\/"},"modified":"2024-10-26T09:58:20","modified_gmt":"2024-10-26T09:58:20","slug":"bs-iso-iec-15408-12022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-15408-12022\/","title":{"rendered":"BS ISO\/IEC 15408-1:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
8<\/td>\nForeword <\/td>\n<\/tr>\n
10<\/td>\nIntroduction <\/td>\n<\/tr>\n
13<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
14<\/td>\n3 Terms and definitions <\/td>\n<\/tr>\n
25<\/td>\n4 Abbreviated terms <\/td>\n<\/tr>\n
27<\/td>\n5 Overview
5.1 General
5.2 ISO\/IEC 15408 series description
5.2.1 General <\/td>\n<\/tr>\n
28<\/td>\n5.2.2 Audience <\/td>\n<\/tr>\n
31<\/td>\n5.3 Target of evaluation (TOE)
5.3.1 General
5.3.2 TOE boundaries <\/td>\n<\/tr>\n
32<\/td>\n5.3.3 Different representations of the TOE
5.3.4 Different configurations of the TOE
5.3.5 Operational environment of the TOE <\/td>\n<\/tr>\n
33<\/td>\n5.4 Presentation of material in this document
6 General model
6.1 Background
6.2 Assets and security controls <\/td>\n<\/tr>\n
36<\/td>\n6.3 Core constructs of the paradigm of the ISO\/IEC 15408 series
6.3.1 General
6.3.2 Conformance types
6.3.3 Communicating security requirements <\/td>\n<\/tr>\n
39<\/td>\n6.3.4 Meeting the needs of consumers (risk owners) <\/td>\n<\/tr>\n
41<\/td>\n7 Specifying security requirements
7.1 Security problem definition (SPD)
7.1.1 General
7.1.2 Threats <\/td>\n<\/tr>\n
42<\/td>\n7.1.3 Organizational security policies (OSPs)
7.1.4 Assumptions <\/td>\n<\/tr>\n
43<\/td>\n7.2 Security objectives
7.2.1 General
7.2.2 Security objectives for the TOE
7.2.3 Security objectives for the operational environment <\/td>\n<\/tr>\n
44<\/td>\n7.2.4 Relation between security objectives and the SPD
7.2.5 Tracing between security objectives and the SPD <\/td>\n<\/tr>\n
45<\/td>\n7.2.6 Providing a justification for the tracing
7.2.7 On countering threats
7.2.8 Security objectives: conclusion
7.3 Security requirements
7.3.1 General <\/td>\n<\/tr>\n
46<\/td>\n7.3.2 Security Functional Requirements (SFRs) <\/td>\n<\/tr>\n
48<\/td>\n7.3.3 Security assurance requirements (SARs) <\/td>\n<\/tr>\n
49<\/td>\n7.3.4 Security requirements: conclusion <\/td>\n<\/tr>\n
50<\/td>\n8 Security components
8.1 Hierarchical structure of security components
8.1.1 General
8.1.2 Class <\/td>\n<\/tr>\n
51<\/td>\n8.1.3 Family
8.1.4 Component
8.1.5 Element
8.2 Operations
8.2.1 General <\/td>\n<\/tr>\n
52<\/td>\n8.2.2 Iteration
8.2.3 Assignment <\/td>\n<\/tr>\n
53<\/td>\n8.2.4 Selection <\/td>\n<\/tr>\n
55<\/td>\n8.2.5 Refinement <\/td>\n<\/tr>\n
56<\/td>\n8.3 Dependencies between components
8.4 Extended components
8.4.1 General <\/td>\n<\/tr>\n
57<\/td>\n8.4.2 Defining extended components
9 Packages
9.1 General <\/td>\n<\/tr>\n
58<\/td>\n9.2 Package types
9.2.1 General
9.2.2 Assurance packages <\/td>\n<\/tr>\n
59<\/td>\n9.2.3 Functional packages
9.3 Package dependencies
9.4 Evaluation method(s) and activities <\/td>\n<\/tr>\n
60<\/td>\n10 Protection Profiles (PPs)
10.1 General
10.2 PP introduction
10.3 Conformance claims and conformance statements <\/td>\n<\/tr>\n
63<\/td>\n10.4 Security assurance requirements (SARs)
10.5 Additional requirements common to strict and demonstrable conformance
10.5.1 Conformance claims and conformance statements
10.5.2 Security problem definition (SPD) <\/td>\n<\/tr>\n
64<\/td>\n10.5.3 Security objectives
10.6 Additional requirements specific to strict conformance
10.6.1 Requirements for the security problem definition (SPD)
10.6.2 Requirements for the security objectives
10.6.3 Requirements for the security requirements <\/td>\n<\/tr>\n
65<\/td>\n10.7 Additional requirements specific to demonstrable conformance
10.8 Additional requirements specific to exact conformance
10.8.1 General
10.8.2 Conformance claims and statements <\/td>\n<\/tr>\n
66<\/td>\n10.9 Using PPs
10.10 Conformance statements and claims in the case of multiple PPs
10.10.1 General
10.10.2 Where strict or demonstrable conformance is specified
10.10.3 Where exact conformance is specified
11 Modular requirements construction
11.1 General <\/td>\n<\/tr>\n
67<\/td>\n11.2 PP-Modules
11.2.1 General
11.2.2 PP-Module Base
11.2.3 Requirements for PP-Modules <\/td>\n<\/tr>\n
71<\/td>\n11.3 PP-Configurations
11.3.1 General
11.3.2 Requirements for PP-Configurations <\/td>\n<\/tr>\n
77<\/td>\n11.3.3 Usage of PP-Configurations <\/td>\n<\/tr>\n
80<\/td>\n12 Security Targets (STs)
12.1 General
12.2 Conformance claims and statements <\/td>\n<\/tr>\n
83<\/td>\n12.3 Assurance requirements
12.4 Additional requirements in the exact conformance case
12.4.1 Additional requirements for the conformance claim
12.4.2 Additional requirements for the SPD <\/td>\n<\/tr>\n
84<\/td>\n12.4.3 Additional requirements for the security objectives
12.4.4 Additional requirements for the security requirements
12.5 Additional requirements in the multi-assurance case <\/td>\n<\/tr>\n
86<\/td>\n13 Evaluation and evaluation results
13.1 General <\/td>\n<\/tr>\n
88<\/td>\n13.2 Evaluation context <\/td>\n<\/tr>\n
89<\/td>\n13.3 Evaluation of PPs and PP-Configurations
13.4 Evaluation of STs
13.5 Evaluation of TOEs <\/td>\n<\/tr>\n
90<\/td>\n13.6 Evaluation methods and evaluation activities
13.7 Evaluation results
13.7.1 Results of a PP evaluation
13.7.2 Results of a PP-Configuration evaluation
13.7.3 Results of a ST\/TOE evaluation <\/td>\n<\/tr>\n
91<\/td>\n13.8 Multi-assurance evaluation <\/td>\n<\/tr>\n
92<\/td>\n14 Composition of assurance
14.1 General <\/td>\n<\/tr>\n
93<\/td>\n14.2 Composition models
14.2.1 Layered composition model <\/td>\n<\/tr>\n
94<\/td>\n14.2.2 Network or bi-directional composition model
14.2.3 Embedded composition model <\/td>\n<\/tr>\n
95<\/td>\n14.3 Evaluation techniques for providing assurance in composition models
14.3.1 General
14.3.2 ACO class for composed TOEs <\/td>\n<\/tr>\n
96<\/td>\n14.3.3 Composite evaluation for composite products <\/td>\n<\/tr>\n
107<\/td>\n14.4 Requirements for evaluations using composition techniques
14.4.1 Re-use of evaluation results <\/td>\n<\/tr>\n
108<\/td>\n14.4.2 Composition evaluation issues <\/td>\n<\/tr>\n
109<\/td>\n14.5 Evaluation by composition and multi-assurance <\/td>\n<\/tr>\n
110<\/td>\nAnnex A (normative) Specification of packages <\/td>\n<\/tr>\n
114<\/td>\nAnnex B (normative) Specification of Protection Profiles (PPs) <\/td>\n<\/tr>\n
124<\/td>\nAnnex C (normative) Specification of PP-Modules and PP-Configurations <\/td>\n<\/tr>\n
137<\/td>\nAnnex D (normative) Specification of Security Targets (STs) and Direct Rationale STs <\/td>\n<\/tr>\n
148<\/td>\nAnnex E (normative) PP\/PP-Configuration conformance <\/td>\n<\/tr>\n
153<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security, cybersecurity and privacy protection \u2014 Evaluation criteria for IT security – Part 1: Introduction and general model<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n156<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":408154,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-408146","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/408146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/408154"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=408146"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=408146"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=408146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}