CSA ISO/IEC 15408-2 : 2009
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 2: SECURITY FUNCTIONAL COMPONENTS
Hardcopy , PDF
07-22-2021
English
01-01-2014
Foreword
Legal Notice
Introduction
1 Scope
2 Normative references
3 Terms and definitions, symbols and abbreviated
terms
4 Overview
5 Functional requirements paradigm
6 Security functional components
7 Class FAU: Security audit
8 Class FCO: Communication
9 Class FCS: Cryptographic support
10 Class FDP: User data protection
11 Class FIA: Identification and authentication
12 Class FMT: Security management
13 Class FPR: Privacy
14 Class FPT: Protection of the TSF
15 Class FRU: Resource utilisation
16 Class FTA: TOE access
17 Class FTP: Trusted path/channels
Annex A (normative) - Security functional requirements
application notes
Annex B (normative) - Functional classes, families, and
components
Annex C (normative) - Class FAU: Security audit
Annex D (normative) - Class FCO: Communication
Annex E (normative) - Class FCS: Cryptographic support
Annex F (normative) - Class FDP: User data protection
Annex G (normative) - Class FIA: Identification and
authentication
Annex H (normative) - Class FMT: Security management
Annex I (normative) - Class FPR: Privacy
Annex J (normative) - Class FPT: Protection of the TSF
Annex K (normative) - Class FRU: Resource utilisation
Annex L (normative) - Class FTA: TOE access
Annex M (normative) - Class FTP: Trusted path/channels
Specifies the required structure and content of security functional components for the purpose of security evaluation.
DocumentType |
Standard
|
Pages |
250
|
ProductNote |
Reconfirmed EN
|
PublisherName |
Canadian Standards Association
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO/IEC 15408-2:2008 | Identical |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.