Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • Secure PDF 🔒
    • Immediate download
    • $225.00
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $225.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

CSA Preface 

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). For brevity, this Standard will be referred to as "CSA ISO/IEC 15408-1" throughout. This Standard supersedes CSA ISO/IEC 15408-1:10 (adopted ISO/IEC 15408-1:2009). The International Standard was reviewed by the CSA TCIT under the jurisdiction of the CSA Strategic Steering Committee on Information and Communications Technology and deemed acceptable for use in Canada. This Standard has been formally approved, without modification, by the Technical Committee and has been developed in compliance with Standards Council of Canada requirements for National Standards of Canada. It has been published as a National Standard of Canada by CSA Group. 

Scope 

This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products. This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts of the ISO/IEC 15408 series; defines the terms and abbreviations to be used in all parts of the standard; establishes the core concept of a Target of Evaluation (TOE); describes the evaluation context and describes the audience to which the evaluation criteria is addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given. This document introduces: 

— the key concepts of Protection Profiles (PP), PP-Modules, PP-Configurations, packages, Security Targets (ST), and conformance types; 

— a description of the organization of security components throughout the model; 

— the various operations by which the functional and assurance components given in ISO/IEC 15408-2 and ISO/IEC 15408-3 can be tailored through the use of permitted operations; 

— general information about the evaluation methods given in ISO/IEC 18045; 

— guidance for the application of ISO/IEC 15408-4 in order to develop evaluation methods (EM) and evaluation activities (EA) derived from ISO/IEC 18045; 

— general information about the pre-defined Evaluation Assurance Levels (EALs) defined in ISO/IEC 15408-5; 

— information in regard to the scope of evaluation schemes.

 

Document History

  1. CAN/CSA-ISO/IEC 15408-1:23

    👀 currently
    viewing


    Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model (Adopted ISO/IEC 15408-1:2022, fourth edition, 2022-08)

    • Most Recent
  2. CAN/CSA-ISO/IEC 15408-1:10 (R2020)


    Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 1: Introduction and General Model (Adopted ISO/IEC 15408-1:2005, second edition, 2005-10-01)

    • Historical Version
  3. CAN/CSA-ISO/IEC 15408-1-06


    Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 1: Introduction and General Model (Adopted ISO/IEC 15408-1:2005, second edition, 2005-10-01)

    • Historical Version
  4. CAN/CSA-ISO/IEC 15408-1-02


    Information technology - Security techniques - Evaluation criteria For IT security - Part 1: Introduction and general model

    • Historical Version