• There are no items in your cart

CSA ISO/IEC 15408-2 : 2009

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 2: SECURITY FUNCTIONAL COMPONENTS

Available format(s)

Hardcopy , PDF

Superseded date

07-22-2021

Language(s)

English

Published date

01-01-2014

Foreword
Legal Notice
Introduction
1 Scope
2 Normative references
3 Terms and definitions, symbols and abbreviated
   terms
4 Overview
5 Functional requirements paradigm
6 Security functional components
7 Class FAU: Security audit
8 Class FCO: Communication
9 Class FCS: Cryptographic support
10 Class FDP: User data protection
11 Class FIA: Identification and authentication
12 Class FMT: Security management
13 Class FPR: Privacy
14 Class FPT: Protection of the TSF
15 Class FRU: Resource utilisation
16 Class FTA: TOE access
17 Class FTP: Trusted path/channels
Annex A (normative) - Security functional requirements
        application notes
Annex B (normative) - Functional classes, families, and
        components
Annex C (normative) - Class FAU: Security audit
Annex D (normative) - Class FCO: Communication
Annex E (normative) - Class FCS: Cryptographic support
Annex F (normative) - Class FDP: User data protection
Annex G (normative) - Class FIA: Identification and
        authentication
Annex H (normative) - Class FMT: Security management
Annex I (normative) - Class FPR: Privacy
Annex J (normative) - Class FPT: Protection of the TSF
Annex K (normative) - Class FRU: Resource utilisation
Annex L (normative) - Class FTA: TOE access
Annex M (normative) - Class FTP: Trusted path/channels

Specifies the required structure and content of security functional components for the purpose of security evaluation.

DocumentType
Standard
Pages
250
ProductNote
Reconfirmed EN
PublisherName
Canadian Standards Association
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 15408-2:2008 Identical

ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.