Shopping Cart

No products in the cart.

BS ISO/IEC 15408-3:2022

$215.11

Information security, cybersecurity and privacy protection. Evaluation criteria for IT security – Security assurance components

Published By Publication Date Number of Pages
BSI 2022 204
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 National foreword
12 Foreword
14 Introduction
15 1 Scope
2 Normative references
3 Terms and definitions
19 4 Overview
20 5 Assurance paradigm
5.1 General
5.2 ISO/IEC 15408 series approach
5.3 Assurance approach
5.3.1 General
5.3.2 Significance of vulnerabilities
21 5.3.3 Cause of vulnerabilities
5.3.4 ISO/IEC 15408 series assurance
5.3.5 Assurance through evaluation
22 5.4 ISO/IEC 15408 series evaluation assurance scale
6 Security assurance components
6.1 General
6.2 Assurance class structure
6.2.1 General
6.2.2 Class name
6.2.3 Class introduction
23 6.2.4 Assurance families
6.3 Assurance family structure
6.3.1 Family name
6.3.2 Objectives
24 6.3.3 Component levelling
6.3.4 Application notes
6.3.5 Assurance components
6.4 Assurance component structure
6.4.1 General
25 6.4.2 Component identification
6.4.3 Objectives
6.4.4 Application notes
6.4.5 Dependencies
6.4.6 Assurance elements
26 6.5 Assurance elements
6.6 Component taxonomy
7 Class APE: Protection Profile (PP) evaluation
7.1 General
27 7.2 PP introduction (APE_INT)
7.2.1 Objectives
7.2.2 APE_INT.1 PP introduction
28 7.3 Conformance claims (APE_CCL)
7.3.1 Objectives
7.3.2 APE_CCL.1 Conformance claims
30 7.4 Security problem definition (APE_SPD)
7.4.1 Objectives
7.4.2 APE_SPD.1 Security problem definition
7.5 Security objectives (APE_OBJ)
7.5.1 Objectives
31 7.5.2 Component levelling
7.5.3 APE_OBJ.1 Security objectives for the operational environment
7.5.4 APE_OBJ.2 Security objectives
32 7.6 Extended components definition (APE_ECD)
7.6.1 Objectives
7.6.2 APE_ECD.1 Extended components definition
33 7.7 Security requirements (APE_REQ)
7.7.1 Objectives
7.7.2 Component levelling
7.7.3 APE_REQ.1 Direct rationale PP-Module security requirements
34 7.7.4 APE_REQ.2 Derived security requirements
36 8 Class ACE: Protection Profile Configuration evaluation
8.1 General
8.2 PP-Module introduction (ACE_INT)
8.2.1 Objectives
8.2.2 ACE_INT.1 PP-Module introduction
37 8.3 PP-Module conformance claims (ACE_CCL)
8.3.1 Objectives
38 8.3.2 ACE_CCL.1 PP-Module conformance claims
39 8.4 PP-Module security problem definition (ACE_SPD)
8.4.1 Objectives
8.4.2 ACE_SPD.1 PP-Module security problem definition
40 8.5 PP-Module security objectives (ACE_OBJ)
8.5.1 Objectives
8.5.2 Component levelling
8.5.3 ACE_OBJ.1 PP-Module security objectives for the operational environment
41 8.5.4 ACE_OBJ.2 PP-Module security objectives
8.6 PP-Module extended components definition (ACE_ECD)
8.6.1 Objectives
42 8.6.2 ACE_ECD.1 PP-Module extended components definition
8.7 PP-Module security requirements (ACE_REQ)
8.7.1 Objectives
43 8.7.2 Component levelling
8.7.3 ACE_REQ.1 PP-Module stated security requirements
44 8.7.4 ACE_REQ.2 PP-Module derived security requirements
45 8.8 PP-Module consistency (ACE_MCO)
8.8.1 Objectives
8.8.2 ACE_MCO.1 PP-Module consistency
46 8.9 PP-Configuration consistency (ACE_CCO)
8.9.1 Objectives
47 8.9.2 ACE_CCO.1 PP-Configuration consistency
50 9 Class ASE: Security Target (ST) evaluation
9.1 General
9.2 ST introduction (ASE_INT)
9.2.1 Objectives
9.2.2 ASE_INT.1 ST introduction
51 9.3 Conformance claims (ASE_CCL)
9.3.1 Objectives
52 9.3.2 ASE_CCL.1 Conformance claims
53 9.4 Security problem definition (ASE_SPD)
9.4.1 Objectives
9.4.2 ASE_SPD.1 Security problem definition
54 9.5 Security objectives (ASE_OBJ)
9.5.1 Objectives
9.5.2 Component levelling
9.5.3 ASE_OBJ.1 Security objectives for the operational environment
55 9.5.4 ASE_OBJ.2 Security objectives
56 9.6 Extended components definition (ASE_ECD)
9.6.1 Objectives
9.6.2 ASE_ECD.1 Extended components definition
57 9.7 Security requirements (ASE_REQ)
9.7.1 Objectives
9.7.2 Component levelling
9.7.3 ASE_REQ.1 Direct rationale security requirements
58 9.7.4 ASE_REQ.2 Derived security requirements
60 9.8 TOE summary specification (ASE_TSS)
9.8.1 Objectives
9.8.2 Component levelling
9.8.3 ASE_TSS.1 TOE summary specification
9.8.4 ASE_TSS.2 TOE summary specification with architectural design summary
61 9.9 Consistency of composite product Security Target (ASE_COMP)
9.9.1 Objectives
9.9.2 Component levelling
9.9.3 Application notes
62 9.9.4 ASE_COMP.1 Consistency of Security Target (ST)
63 10 Class ADV: Development
10.1 General
67 10.2 Security Architecture (ADV_ARC)
10.2.1 Objectives
68 10.2.2 Component levelling
10.2.3 Application notes
10.2.4 ADV_ARC.1 Security architecture description
69 10.3 Functional specification (ADV_FSP)
10.3.1 Objectives
70 10.3.2 Component levelling
10.3.3 Application notes
72 10.3.4 ADV_FSP.1 Basic functional specification
73 10.3.5 ADV_FSP.2 Security-enforcing functional specification
74 10.3.6 ADV_FSP.3 Functional specification with complete summary
10.3.7 ADV_FSP.4 Complete functional specification
75 10.3.8 ADV_FSP.5 Complete semi-formal functional specification with additional error information
76 10.3.9 ADV_FSP.6 Complete semi-formal functional specification with additional formal specification
78 10.4 Implementation representation (ADV_IMP)
10.4.1 Objectives
10.4.2 Component levelling
10.4.3 Application notes
79 10.4.4 ADV_IMP.1 Implementation representation of the TSF
80 10.4.5 ADV_IMP.2 Complete mapping of the implementation representation of the TSF
10.5 TSF internals (ADV_INT)
10.5.1 Objectives
10.5.2 Component levelling
81 10.5.3 Application notes
10.5.4 ADV_INT.1 Well-structured subset of TSF internals
82 10.5.5 ADV_INT.2 Well-structured internals
83 10.5.6 ADV_INT.3 Minimally complex internals
84 10.6 Security policy modelling (ADV_SPM)
10.6.1 Objectives
10.6.2 Component levelling
10.6.3 Application notes
10.6.4 ADV_SPM.1 Formal TOE security policy model
86 10.7 TOE design (ADV_TDS)
10.7.1 Objectives
10.7.2 Component levelling
10.7.3 Application notes
87 10.7.4 ADV_TDS.1 Basic design
88 10.7.5 ADV_TDS.2 Architectural design
89 10.7.6 ADV_TDS.3 Basic modular design
91 10.7.7 ADV_TDS.4 Semiformal modular design
92 10.7.8 ADV_TDS.5 Complete semiformal modular design
93 10.7.9 ADV_TDS.6 Complete semiformal modular design with formal high-level design presentation
94 10.8 Composite design compliance (ADV_COMP)
10.8.1 Objectives
10.8.2 Component levelling
10.8.3 Application notes
95 10.8.4 ADV_COMP.1 Design compliance with the base component-related user guidance, ETR for composite evaluation and report of the base component evaluation authority
96 11 Class AGD: Guidance documents
11.1 General
11.2 Operational user guidance (AGD_OPE)
11.2.1 Objectives
97 11.2.2 Component levelling
11.2.3 Application notes
11.2.4 AGD_OPE.1 Operational user guidance
98 11.3 Preparative procedures (AGD_PRE)
11.3.1 Objectives
11.3.2 Component levelling
11.3.3 Application notes
99 11.3.4 AGD_PRE.1 Preparative procedures
12 Class ALC: Life-cycle support
12.1 General
100 12.2 CM capabilities (ALC_CMC)
12.2.1 Objectives
101 12.2.2 Component levelling
12.2.3 Application notes
102 12.2.4 ALC_CMC.1 Labelling of the TOE
12.2.5 ALC_CMC.2 Use of the CM system
103 12.2.6 ALC_CMC.3 Authorization controls
105 12.2.7 ALC_CMC.4 Production support, acceptance procedures and automation
107 12.2.8 ALC_CMC.5 Advanced support
110 12.3 CM scope (ALC_CMS)
12.3.1 Objectives
12.3.2 Component levelling
111 12.3.3 Application notes
12.3.4 ALC_CMS.1 TOE CM coverage
12.3.5 ALC_CMS.2 Parts of the TOE CM coverage
112 12.3.6 ALC_CMS.3 Implementation representation CM coverage
113 12.3.7 ALC_CMS.4 Problem tracking CM coverage
114 12.3.8 ALC_CMS.5 Development tools CM coverage
115 12.4 Delivery (ALC_DEL)
12.4.1 Objectives
12.4.2 Component levelling
12.4.3 Application notes
12.4.4 ALC_DEL.1 Delivery procedures
116 12.5 Developer environment security (ALC_DVS)
12.5.1 Objectives
12.5.2 Component levelling
12.5.3 Application notes
12.5.4 ALC_DVS.1 Identification of security controls
117 12.5.5 ALC_DVS.2 Sufficiency of security controls
12.6 Flaw remediation (ALC_FLR)
12.6.1 Objectives
118 12.6.2 Component levelling
12.6.3 Application notes
12.6.4 ALC_FLR.1 Basic flaw remediation
119 12.6.5 ALC_FLR.2 Flaw reporting procedures
120 12.6.6 ALC_FLR.3 Systematic flaw remediation
121 12.7 Development Life-cycle definition (ALC_LCD)
12.7.1 Objectives
122 12.7.2 Component levelling
12.7.3 Application notes
12.7.4 ALC_LCD.1 Developer defined life-cycle processes
123 12.7.5 ALC_LCD.2 Measurable life-cycle model
124 12.8 TOE Development Artefacts (ALC_TDA)
12.8.1 Objectives
12.8.2 Component levelling
12.8.3 Application notes
125 12.8.4 ALC_TDA.1 Uniquely identifying implementation representation
126 12.8.5 ALC_TDA.2 Matching CMS scope of implementation representation
129 12.8.6 ALC_TDA.3 Regenerate TOE with well-defined development tools
131 12.9 Tools and techniques (ALC_TAT)
12.9.1 Objectives
12.9.2 Component levelling
12.9.3 Application notes
132 12.9.4 ALC_TAT.1 Well-defined development tools
12.9.5 ALC_TAT.2 Compliance with implementation standards
133 12.9.6 ALC_TAT.3 Compliance with implementation standards – all parts
134 12.10 Integration of composition parts and consistency check of delivery procedures (ALC_COMP)
12.10.1 Objectives
12.10.2 Component levelling
12.10.3 Application notes
135 12.10.4 ALC_COMP.1 Integration of the dependent component into the related base component and Consistency check for delivery and acceptance procedures
13 Class ATE: Tests
13.1 General
136 13.2 Coverage (ATE_COV)
13.2.1 Objectives
13.2.2 Component levelling
13.2.3 Application notes
13.2.4 ATE_COV.1 Evidence of coverage
137 13.2.5 ATE_COV.2 Analysis of coverage
138 13.2.6 ATE_COV.3 Rigorous analysis of coverage
13.3 Depth (ATE_DPT)
13.3.1 Objectives
139 13.3.2 Component levelling
13.3.3 Application notes
13.3.4 ATE_DPT.1 Testing: basic design
140 13.3.5 ATE_DPT.2 Testing: security enforcing modules
13.3.6 ATE_DPT.3 Testing: modular design
141 13.3.7 ATE_DPT.4 Testing: implementation representation
142 13.4 Functional tests (ATE_FUN)
13.4.1 Objectives
13.4.2 Component levelling
13.4.3 Application notes
13.4.4 ATE_FUN.1 Functional testing
143 13.4.5 ATE_FUN.2 Ordered functional testing
144 13.5 Independent testing (ATE_IND)
13.5.1 Objectives
13.5.2 Component levelling
13.5.3 Application notes
145 13.5.4 ATE_IND.1 Independent testing – conformance
146 13.5.5 ATE_IND.2 Independent testing – sample
147 13.5.6 ATE_IND.3 Independent testing – complete
148 13.6 Composite functional testing (ATE_COMP)
13.6.1 Objectives
13.6.2 Component levelling
13.6.3 Application notes
13.6.4 ATE_COMP.1 Composite product functional testing
149 14 Class AVA: Vulnerability assessment
14.1 General
14.2 Application notes
150 14.3 Vulnerability analysis (AVA_VAN)
14.3.1 Objectives
14.3.2 Component levelling
14.3.3 AVA_VAN.1 Vulnerability survey
151 14.3.4 AVA_VAN.2 Vulnerability analysis
152 14.3.5 AVA_VAN.3 Focused vulnerability analysis
153 14.3.6 AVA_VAN.4 Methodical vulnerability analysis
154 14.3.7 AVA_VAN.5 Advanced methodical vulnerability analysis
155 14.4 Composite vulnerability assessment (AVA_COMP)
14.4.1 Objectives
14.4.2 Component levelling
156 14.4.3 Application notes
14.4.4 AVA_COMP.1 Composite product vulnerability assessment
157 15 Class ACO: Composition
15.1 General
160 15.2 Composition rationale (ACO_COR)
15.2.1 Objectives
15.2.2 Component levelling
15.2.3 ACO_COR.1 Composition rationale
15.3 Development evidence (ACO_DEV)
15.3.1 Objectives
15.3.2 Component levelling
15.3.3 Application notes
161 15.3.4 ACO_DEV.1 Functional Description
162 15.3.5 ACO_DEV.2 Basic evidence of design
15.3.6 ACO_DEV.3 Detailed evidence of design
163 15.4 Reliance of dependent component (ACO_REL)
15.4.1 Objectives
164 15.4.2 Component levelling
15.4.3 Application notes
15.4.4 ACO_REL.1 Basic reliance information
15.4.5 ACO_REL.2 Reliance information
165 15.5 Composed TOE testing (ACO_CTT)
15.5.1 Objectives
15.5.2 Component levelling
15.5.3 Application notes
166 15.5.4 ACO_CTT.1 Interface testing
167 15.5.5 ACO_CTT.2 Rigorous interface testing
168 15.6 Composition vulnerability analysis (ACO_VUL)
15.6.1 Objectives
15.6.2 Component levelling
15.6.3 Application notes
169 15.6.4 ACO_VUL.1 Composition vulnerability review
15.6.5 ACO_VUL.2 Composition vulnerability analysis
170 15.6.6 ACO_VUL.3 Enhanced-Basic Composition vulnerability analysis
172 Annex A (informative) Development (ADV)
192 Annex B (informative) Composition (ACO)
199 Annex C (informative) Cross reference of assurance component dependencies
203 Bibliography
BS ISO/IEC 15408-3:2022
$215.11