EG 202 387 : 1.1.1
Current
The latest, up-to-date edition.
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Security in standardization
4.1 Communications security model
4.2 Standards review and evaluation
4.3 Overall development process
4.4 Protocol standards containing security-related requirements
5 Overview of ISO/IEC 15408
5.1 Introduction to the Common Criteria (CC)
5.2 Overview of CC documents
5.3 ETSI standards in the evaluation of CC
6 Evaluation components in ISO/IEC-15408-3
6.1 Introduction
6.2 Configuration management
6.3 Delivery and operation
6.4 Development
6.5 Guidance documents
6.6 Life cycle support
6.7 Tests
6.8 Vulnerability assessment
6.9 Maintenance of assurance
Annex A (normative): Functional components in ISO/IEC-15408-2
A.1 Introduction
A.2 Security audit
A.3 Communication
A.4 Cryptographic support
A.5 User data protection
A.6 Identification and authentication
A.7 Security management
A.8 Privacy
A.9 Protection of the TSF
A.10 Resource utilization
A.11 TOE Access
A.12 Trusted path/channels
Annex B (normative): Protocol Implementation Conformance
Statement (PICS)
Annex C (informative): Bibliography
History
Provides guidance to standards authors (rapporteurs and contributors) on the scope and application of the Common Criteria for Information Technology Security Evaluation and how ETSI standards may be developed to meet the goals and objectives of the Common Criteria.
Committee |
TISPAN 07
|
DocumentType |
Standard
|
Pages |
60
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
TR 102 764 : 1.1.1 | EHEALTH; ARCHITECTURE; ANALYSIS OF USER SERVICE MODELS, TECHNOLOGIES AND APPLICATIONS SUPPORTING EHEALTH |
TR 102 780 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
EG 202 549 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES |
TR 103 303 : 1.1.1 | CYBER; PROTECTION MEASURES FOR ICT IN THE CONTEXT OF CRITICAL INFRASTRUCTURE |
TR 102 420 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY |
TR 187 020 : 1.1.1 | RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436 |
GS NFV-SEC 006 : 1.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS |
ES 202 382 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES |
SR 002 564 : 2.0.0 | APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH |
TR 187 011 : 2.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES |
TS 102 165-1 : 4.2.3 | CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
TR 187 002 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS |
TS 187 016 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE) |
ES 202 383 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS |
TS 102 556 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE |
EG 201 383 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS) - USE OF SDL IN ETSI DELIVERABLES - GUIDELINES FOR FACILITATING VALIDATION AND THE DEVELOPMENT OF CONFORMANCE TESTS |
TS 102 165-2 : 4.2.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES |
TS 102 237-1 : 4.1.1 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; INTEROPERABILITY TEST METHODS AND APPROACHES; PART 1: GENERIC APPROACH TO INTEROPERABILITY TESTING |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ES 202 382 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES |
ETR 232 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
EG 201 015 : 2.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); STANDARDS ENGINEERING PROCESS; A HANDBOOK OF VALIDATION METHODS |
ES 202 383 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS |
ETR 237 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
EG 202 107 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS) - PLANNING FOR VALIDATION AND TESTING IN THE STANDARDS-MAKING PROCESS |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
TS 102 165-1 : 4.2.3 | CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
EG 202 106 : 2.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); GUIDELINES FOR THE USE OF FORMAL SDL AS A DESCRIPTIVE TOOL |
ETR 184 : 20001 | METHODS FOR TESTING AND SPECIFICATION (MTS); OVERVIEW OF VALIDATION TECHNIQUES FOR EUROPEAN TELECOMMUNICATION STANDARDS (ETSS) CONTAINING SDL |
EG 201 058 : 1.2.4 | METHODS FOR TESTING AND SPECIFICATION (MTS); IMPLEMENTATION CONFORMANCE STATEMENT (ICS) PROFORMA STYLE GUIDE |
TR 101 052 : 1.1.1 | SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD AUTHENTICATION AND KEY MANAGEMENT ALGORITHM SET TAA1 |
EG 201 872 : 1.2.1 | METHODS FOR TESTING AND SPECIFICATIONS; METHODOLOGICAL APPROACH TO THE USE OF OBJECT-ORIENTATION DESIGN IN THE STANDARDS MAKING PROCESS |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
EN 300 396-6 : 1.5.1 | TERRESTRIAL TRUNKED RADIO (TETRA); DIRECT MODE OPERATION (DMO); PART 6: SECURITY |
ISO/IEC 10181-4:1997 | Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4: |
SR 001 262 : 2.0.0 | ETSI DRAFTING RULES |
ETS 300 406 : 20001 | METHODS FOR TESTING AND SPECIFICATION (MTS) - PROTOCOL AND PROFILE CONFORMANCE TESTING SPECIFICATIONS - STANDARDIZATION METHODOLOGY |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ETR 332 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) |
EN 300 392-7 : 3.3.1 | TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.