Shopping Cart

No products in the cart.

BSI PD CEN ISO/TS 17574:2017

$198.66

Electronic fee collection. Guidelines for security protection profiles

Published By Publication Date Number of Pages
BSI 2017 64
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document provides guidelines for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in ISO/IEC 15408 ( all parts ) and in ISO/IEC TR 15446 .

By Protection Profile (PP), it means a set of security requirements for a category of products or systems that meet specific needs. A typical example would be a PP for On-Board Equipment (OBE) to be used in an EFC system. However, the guidelines in this document are superseded if a Protection Profile already exists for the subsystem in consideration.

The target of evaluation (TOE) for EFC is limited to EFC specific roles and interfaces as shown in Figure 1. Since the existing financial security standards and criteria are applicable to other external roles and interfaces, they are assumed to be outside the scope of TOE for EFC.

Figure 1 Scope of TOE for EFC

The security evaluation is performed by assessing the security-related properties of roles, entities and interfaces defined in security targets (STs), as opposed to assessing complete processes which often are distributed over more entities and interfaces than those covered by the TOE of this document.

NOTE Assessing security issues for complete processes is a complimentary approach, which may well be beneficial to apply when evaluating the security of a system.

PDF Catalog

PDF Pages PDF Title
7 Foreword
8 Introduction
10 1 Scope
2 Normative references
11 3 Terms and definitions
13 4 Abbreviated terms
14 5 EFC security architecture and protection profile processes
5.1 General
5.2 EFC security architecture
15 5.3 Protection profile preparatory steps
16 5.4 Relationship between actors
18 6 Outlines of Protection Profile
6.1 Structure
19 6.2 Context
20 Annex A (informative) Procedures for preparing documents
54 Annex B (informative) Example of threat analysis evaluation method
59 Annex C (informative) Relevant security standards in the context of the EFC
60 Annex D (informative) Common Criteria Recognition Arrangement (CCRA)
61 Bibliography
BSI PD CEN ISO/TS 17574:2017
$198.66