Norm

NPR-ISO/IEC TR 15446:2004 en

Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets

  • Deze norm is ingetrokken sinds 30-03-2009

164,52

Over deze norm

Status Ingetrokken
Aantal pagina's 125
Commissie Informatiebeveiliging, Cyber security en Privacy
Gepubliceerd op 01-07-2004
Taal Engels
This document provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with ISO/IEC 15408 (the 'Common Criteria'). As such, the document is primarily aimed at those who are involved in the development of PPs and STs. However, it is also likely to be useful to evaluators of PPs and STs and to those who are responsible for monitoring PP and ST evaluation. It may also be of interest to consumers and users of PPs and STs who wish to understand what guidance the PP/ST author used, and which parts of the PP or ST are of principal interest. It is assumed that readers of this Technical Report are familiar with ISO/IEC 15408-1, and in particular Annexes B and C which describe PPs and STs. PP and ST authors will (of course) need to become familiar with the other parts of ISO/IEC 15408 as described in this Report, including introductory material such as the functional requirements paradigm described in ISO/IEC 15408-2, 1.3. This document is an informational ISO Technical Report intended for guidance only. It should not be cited as a Standard on the content or structure for the evaluation of PPs and STs. It is intended to be fully consistent with ISO/IEC 15408; however, in the event of any inconsistency between this Technical Report and ISO/IEC 15408, the latter as a normative Standard takes precedence. This Technical Report does not deal with issues such as PP registration and associated tasks such as the handling of protected intellectual property (e.g. patents) in a PP. For information on PP registration procedures, see [1].

Details

ICS-code 35.040
Nederlandse titel Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
Engelse titel Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
Vervangen door

Winkelwagen

Subtotaal:

Ga naar winkelwagen