BS ISO/IEC 15408-2:2005
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology. Security techniques. Evaluation criteria for IT security Security functional requirements
Hardcopy , PDF
09-04-2020
English
18-11-2005
1 Scope
2 Normative references
3 Terms, definitions, symbols and abbreviated terms
4 Overview
5 Functional requirements paradigm
6 Security functional components
7 Class FAU: Security audit
8 Class FCO: Communication
9 Class FCS: Cryptographic support
10 Class FDP: User data protection
11 Class FIA: Identification and authentication
12 Class FMT: Security management
13 Class FPR: Privacy
14 Class FPT: Protection of the TSF
15 Class FRU: Resource utilisation
16 Class FTA: TOE access
17 Class FTP: Trusted path/channels
Annex A (normative) - Security functional requirements
application notes
Annex B (normative) - Functional classes, families, and
components
Annex C (normative) - Class FAU: Security audit
Annex D (normative) - Class FCO: Communication
Annex E (normative) - Class FCS: Cryptographic support
Annex F (normative) - Class FDP: User data protection
Annex G (normative) - Class FIA: Identification and
authentication
Annex H (normative) - Class FMT: Security management
Annex I (normative) - Class FPR: Privacy
Annex J (normative) - Class FPT: Protection of the TSF
Annex K (normative) - Class FRU: Resource utilisation
Annex L (normative) - Class FTA: TOE access
Annex M (normative) - Class FTP: Trusted path/channels
Gives the required structure and content of security functional components for the purpose of security evaluation.
Committee |
IST/33/3
|
DevelopmentNote |
Supersedes 98/652415 DC (05/2005) Supersedes 04/30108739 DC (11/2005) Supersedes 07/30162796 DC. (03/2009)
|
DocumentType |
Standard
|
Pages |
250
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO/IEC 15408-2:2008 | Identical |
ISO/IEC 15408-2:2005 | Identical |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.