ISO/IEC 15408-5:2022 PDF

ISO/IEC 15408-5:2022 PDF

Name:
ISO/IEC 15408-5:2022 PDF

Published Date:
07/31/2022

Status:
Active

Description:

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$58.2
Need Help?

This document provides packages of security assurance and security functional requirements that have been identified as useful in support of common usage by stakeholders.

EXAMPLE        Examples of provided packages include the evaluation assurance levels (EAL) and the composed assurance packages (CAPs).

This document presents:

—    evaluation assurance level (EAL) family of packages that specify pre-defined sets of security assurance components that may be referenced in PPs and STs and which specify appropriate security assurances to be provided during an evaluation of a target of evaluation (TOE);

—    composition assurance (CAP) family of packages that specify sets of security assurance components used for specifying appropriate security assurances to be provided during an evaluation of composed TOEs;

—    composite product (COMP) package that specifies a set of security assurance components used for specifying appropriate security assurances to be provided during an evaluation of a composite product TOEs;

—    protection profile assurance (PPA) family of packages that specify sets of security assurance components used for specifying appropriate security assurances to be provided during a protection profile evaluation;

—    security target assurance (STA) family of packages that specify sets of security assurance components used for specifying appropriate security assurances to be provided during a security target evaluation.

The users of this document can include consumers, developers, and evaluators of secure IT products.


File Size : 1 file , 3.5 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 07/31/2022

History


Related products

ISO/IEC 18028-4:2005
Published Date: 04/01/2005
Information technology - Security techniques - IT network security - Part 4: Securing remote access
$60
ISO/IEC 27000:2018
Published Date: 02/01/2018
Information technology - Security techniques - Information security management systems - Overview and vocabulary
$58.2
ISO/IEC 29101:2018
Published Date: 11/01/2018
Information technology - Security techniques - Privacy architecture framework
$66.9

Best-Selling Products

NS-ISO/IEC 10149:1989
Published Date: 06/01/1989
Information technology — Data interchange on read-only 120 mm optical data disks (CD-ROM)
NS-ISO/IEC 10646:2020/Amd 1:2023
Published Date: 08/04/2023
Information technology - Universal coded character set (UCS) - Amendment 1: CJK Unified Ideographs Extension H, Vithkuqi, Old Uyghur, Cypro-Minoan, and other characters
NS-ISO/IEC 10646:2020
Published Date: 01/29/2021
Information technology - Universal coded character set (UCS)
NS-ISO/IEC 12207:1995
Published Date: 05/08/2001
Information technology — Software life cycle processes
NS-ISO/IEC 12207:2008
Published Date: 06/01/2010
Systems and software engineering — Software life cycle processes
NS-ISO/IEC 13250-2:2006
Published Date: 01/10/2008
Information technology - Topic Maps - Part 2: Data model