Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2008)

ISO/IEC 15408-2:2008 defines the content and presentation of the security functional requirements to be assessed in a security evaluation using ISO/IEC 15408. It contains a comprehensive catalogue of predefined security functional components that will meet most common security needs of the marketplace. These are organized using a hierarchical structure of classes, families and components, and supported by comprehensive user notes.
ISO/IEC 15408-2:2008 also provides guidance on the specification of customized security requirements where no suitable predefined security functional components exist.

Informationstechnik - IT-Sicherheitsverfahren - Evaluationskriterien für IT-Sicherheit - Teil 2: Sicherheitsfunktionskomponenten (ISO/IEC 15408-2:2008)

Technologies de l'information - Techniques de sécurité - Critères d'évaluation pour la sécurité TI - Partie 2: Composants fonctionnels de sécurité (ISO/IEC 15408-2:2008)

Cette partie de l'ISO/IEC 15408 définit la structure requise et le contenu des composants fonctionnels de sécurité dans l'intérêt d'une évaluation de sécurité. Elle comporte un catalogue des composants fonctionnels qui répondront aux exigences fonctionnelles de sécurité communes à de nombreux produits TI.

Informacijska tehnologija - Varnostne tehnike - Merila za vrednotenje varnosti IT - 2. del: Funkcionalne varnostne komponente (ISO/IEC 15408-2:2008)

General Information

Status
Withdrawn
Publication Date
17-Mar-2020
Withdrawal Date
05-Dec-2023
Current Stage

Relations

Buy Standard

Standard
EN ISO/IEC 15408-2:2020
English language
241 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)


SLOVENSKI STANDARD
01-maj-2020
Informacijska tehnologija - Varnostne tehnike - Merila za vrednotenje varnosti IT -
2. del: Funkcionalne varnostne komponente (ISO/IEC 15408-2:2008)
Information technology - Security techniques - Evaluation criteria for IT security - Part 2:
Security functional components (ISO/IEC 15408-2:2008)
Informationstechnik - Sicherheitstechniken - Bewertungskriterien für die IT-Sicherheit -
Teil 2: Sicherheitsfunktionskomponenten (ISO/IEC 15408-2:2008)
Technologies de l'information - Techniques de sécurité - Critères d'évaluation pour la
sécurité TI - Partie 2: Composants fonctionnels de sécurité (ISO/IEC 15408-2:2008)
Ta slovenski standard je istoveten z: EN ISO/IEC 15408-2:2020
ICS:
35.030 Informacijska varnost IT Security
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD
EN ISO/IEC 15408-2
NORME EUROPÉENNE
EUROPÄISCHE NORM
March 2020
ICS 35.030
English version
Information technology - Security techniques - Evaluation
criteria for IT security - Part 2: Security functional
components (ISO/IEC 15408-2:2008)
Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitstechniken -
- Critères d'évaluation pour la sécurité TI - Partie 2: Bewertungskriterien für die IT-Sicherheit - Teil 2:
Composants fonctionnels de sécurité (ISO/IEC 15408- Sicherheitsfunktionskomponenten (ISO/IEC 15408-
2:2008) 2:2008)
This European Standard was approved by CEN on 2 March 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.

CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels
© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 15408-2:2020 E
reserved worldwide for CEN national Members and for
CENELEC Members.
Contents Page
European foreword . 3

European foreword
The text of ISO/IEC 15408-2:2008 has been prepared by Technical Committee ISO/IEC JTC 1
"Information technology” of the International Organization for Standardization (ISO) and has been
taken over as EN ISO/IEC 15408-2:2020 by Technical Committee CEN/CLC/JTC 13 “Cybersecurity and
Data Protection” the secretariat of which is held by DIN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by September 2020, and conflicting national standards
shall be withdrawn at the latest by September 2020.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the
United Kingdom.
Endorsement notice
The text of ISO/IEC 15408-2:2008 has been approved by CEN as EN ISO/IEC 15408-2:2020 without any
modification.
INTERNATIONAL ISO/IEC
STANDARD 15408-2
Third edition
2008-08-15
Corrected version
2011-06-01
Information technology — Security
techniques — Evaluation criteria for IT
security —
Part 2:
Security functional components
Technologies de l'information — Techniques de sécurité — Critères
d'évaluation pour la sécurité TI —
Partie 2: Composants fonctionnels de sécurité

Reference number
ISO/IEC 15408-2:2008(E)
©
ISO/IEC 2008
ISO/IEC 15408-2:2008(E)
©  ISO/IEC 2008
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2008 – All rights reserved

ISO/IEC 15408-2:2008(E)
Contents Page
Foreword .xviii
Introduction.xx
1 Scope.1
2 Normative references.1
3 Terms and definitions, symbols and abbreviated terms.1
4 Overview.1
4.1 Organisation of this part of ISO/IEC 15408.1
5 Functional requirements paradigm .2
6 Security functional components.5
6.1 Overview.5
6.1.1 Class structure.5
6.1.2 Family structure.6
6.1.3 Component structure .8
6.2 Component catalogue.9
6.2.1 Component changes highlighting .10
7 Class FAU: Security audit.10
7.1 Security audit automatic response (FAU_ARP) .11
7.1.1 Family Behaviour.11
7.1.2 Component levelling .11
7.1.3 Management of FAU_ARP.1 .11
7.1.4 Audit of FAU_ARP.1 .11
7.1.5 FAU_ARP.1 Security alarms.11
7.2 Security audit data generation (FAU_GEN) .11
7.2.1 Family Behaviour.11
7.2.2 Component levelling .11
7.2.3 Management of FAU_GEN.1, FAU_GEN.2.11
7.2.4 Audit of FAU_GEN.1, FAU_GEN.2 .11
7.2.5 FAU_GEN.1 Audit data generation .12
7.2.6 FAU_GEN.2 User identity association.12
7.3 Security audit analysis (FAU_SAA) .12
7.3.1 Family Behaviour.12
7.3.2 Component levelling .12
7.3.3 Management of FAU_SAA.1 .13
7.3.4 Management of FAU_SAA.2 .13
7.3.5 Management of FAU_SAA.3 .13
7.3.6 Management of FAU_SAA.4 .13
7.3.7 Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4.13
7.3.8 FAU_SAA.1 Potential violation analysis .13
7.3.9 FAU_SAA.2 Profile based anomaly detection .14
7.3.10 FAU_SAA.3 Simple attack heuristics .14
7.3.11 FAU_SAA.4 Complex attack heuristics.15
7.4 Security audit review (FAU_SAR) .15
7.4.1 Family Behaviour.15
7.4.2 Component levelling .15
7.4.3 Management of FAU_SAR.1 .15
7.4.4 Management of FAU_SAR.2, FAU_SAR.3.15
7.4.5 Audit of FAU_SAR.1 .15
7.4.6 Audit of FAU_SAR.2 .16
7.4.7 Audit of FAU_SAR.3 .16
© ISO/IEC 2008 – All rights reserved iii

ISO/IEC 15408-2:2008(E)
7.4.8 FAU_SAR.1 Audit review.16
7.4.9 FAU_SAR.2 Restricted audit review .16
7.4.10 FAU_SAR.3 Selectable audit review .16
7.5 Security audit event selection (FAU_SEL) .16
7.5.1 Family Behaviour.16
7.5.2 Component levelling .17
7.5.3 Management of FAU_SEL.1 .17
7.5.4 Audit of FAU_SEL.1.
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.