Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • Secure PDF 🔒
    • Immediate download
    • $204.00
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $204.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

Preface:

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).

This Standard supersedes CAN/CSA-ISO/IEC 15408-1-06 (adoption of ISO/IEC 15408-1:2005, second addition, 2005-10-01). At the time of publication, ISO/IEC 15408-1:2009 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC.

Scope:

This part of ISO/IEC 15408 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the International Standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.

It provides an overview of all parts of ISO/IEC 15408. It describes the various parts of the standard; defines the terms and abbreviations to be used in all parts of the International Standard; establishes the core concept of a Target of Evaluation (TOE); the evaluation context; and describes the audience to which the evaluation criteria are addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given.

It defines the various operations by which the functional and assurance components given in ISO/IEC 15408-2 and ISO/IEC 15408-3 may be tailored through the use of permitted operations.

The key concepts of protection profiles (PP), packages of security requirements and the topic of conformance are specified and the consequences of evaluation and evaluation results are described. This part of ISO/IEC 15408 gives guidelines for the specification of Security Targets (ST) and provides a description of the organization of components throughout the model. General information about the evaluation methodology is given in ISO/IEC 18045 and the scope of evaluation schemes is provided.
 

Document History

  1. CAN/CSA-ISO/IEC 15408-1:23


    Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model (Adopted ISO/IEC 15408-1:2022, fourth edition, 2022-08)

    • Most Recent
  2. CAN/CSA-ISO/IEC 15408-1:10 (R2020)

    👀 currently
    viewing


    Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 1: Introduction and General Model (Adopted ISO/IEC 15408-1:2005, second edition, 2005-10-01)

    • Historical Version
  3. CAN/CSA-ISO/IEC 15408-1-06


    Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 1: Introduction and General Model (Adopted ISO/IEC 15408-1:2005, second edition, 2005-10-01)

    • Historical Version
  4. CAN/CSA-ISO/IEC 15408-1-02


    Information technology - Security techniques - Evaluation criteria For IT security - Part 1: Introduction and general model

    • Historical Version