Guidance for developing security and privacy functional requirements based on ISO/IEC 15408

This document provides guidance for: — selecting and specifying security functional requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII); — the procedure to define both privacy and security functional requirements in a coordinated manner; and — developing privacy functional requirements as extended components based on the privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2. The intended audience for this document are: — developers who implement products or systems that deal with PII and want to undergo a security evaluation of those products using ISO/IEC 15408. They will get guidance how to select security functional requirements for the Security Target of their product or system that map to the privacy principles defined in ISO/IEC 29100; — authors of Protection Profiles that address the protection of PII; and — evaluators that use ISO/IEC 15408 and ISO/IEC 18045 for a security evaluation. This document is intended to be fully consistent with ISO/IEC 15408; however, in the event of any inconsistency between this document and ISO/IEC 15408, the latter, as a normative standard, takes precedence.

Lignes directrices pour l'élaboration des exigences fonctionnelles de sécurité et de confidentialité fondées sur l’ISO/IEC 15408

General Information

Status
Published
Publication Date
18-Oct-2018
Current Stage
9093 - International Standard confirmed
Start Date
26-Sep-2025
Completion Date
30-Oct-2025
Ref Project

Overview

ISO/IEC TS 19608:2018 provides practical guidance for developing security and privacy functional requirements for IT products and systems that handle Personally Identifiable Information (PII). Building on the ISO/IEC 15408 evaluation framework, it explains how to select, specify and extend Security Functional Requirements (SFRs) and how to derive Privacy Functional Requirements (PFRs) from the privacy principles in ISO/IEC 29100. The technical specification helps teams align privacy-by-design objectives with formal security evaluation artifacts such as Security Targets (STs) and Protection Profiles (PPs).

Key Topics

  • Mapping privacy to security: Guidance to map ISO/IEC 29100 privacy principles (consent, purpose limitation, data minimization, openness, access, accuracy, accountability, information security) to SFRs in ISO/IEC 15408-2 where possible.
  • Developing extended components: Procedure for creating privacy functional components (extended components) when existing SFRs do not fully address privacy principles.
  • SFR specification process: Selection, assignment, refinement and iteration operations; handling component dependencies and component structure per ISO/IEC 15408.
  • Coordinated requirement definition: Steps to specify both privacy and security requirements together-reducing gaps and conflicts during design and evaluation.
  • Practical templates and examples: Annexes provide existing components used for privacy, Protection Profile examples, and normative templates for extended privacy components.

Applications

ISO/IEC TS 19608:2018 is useful for:

  • Developers and product teams building systems that process PII who need to prepare a Security Target (ST) or seek ISO/IEC 15408-based evaluation.
  • Protection Profile authors creating PPs that address privacy requirements and regulatory privacy controls.
  • Evaluators and certification bodies using ISO/IEC 15408 and ISO/IEC 18045 to assess conformity of security/privacy claims.
  • Privacy engineers and architects implementing privacy-by-design: derive technical controls, guide threat/risk assessments, and support compliance with data protection requirements.

Practical benefits include clearer SFR/PFR traceability, improved privacy-aware design, and more consistent security evaluation outcomes.

Related Standards

  • ISO/IEC 15408-1 & 15408-2 - Evaluation criteria and security functional components (normative precedence).
  • ISO/IEC 29100 - Privacy framework and principles (source of privacy principles).
  • ISO/IEC 18045 - Methodology for IT security evaluation.
  • ISO/IEC TR 15446 - Guidance on specifying SFRs (referenced for SFR specification).

Keywords: ISO/IEC TS 19608:2018, security functional requirements, privacy functional requirements, ISO/IEC 15408, ISO/IEC 29100, PII, Protection Profile, Security Target, privacy-by-design.

Technical specification
ISO/IEC TS 19608:2018 - Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
English language
48 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


TECHNICAL ISO/IEC TS
SPECIFICATION 19608
First edition
2018-10
Guidance for developing security
and privacy functional requirements
based on ISO/IEC 15408
Lignes directrices pour l'élaboration des exigences fonctionnelles de
sécurité et de confidentialité fondées sur l’ISO/IEC 15408
Reference number
©
ISO/IEC 2018
© ISO/IEC 2018
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2018 – All rights reserved

Contents Page
Foreword .v
Introduction .vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms . 2
5 Purpose and structure of this document . 2
6 Requirement definition . 3
6.1 General . 3
6.2 Security functional requirements (SFRs) . 4
6.2.1 General. 4
6.2.2 Example of security functional requirements . 4
6.2.3 The selection, assignment, refinement and iteration operations . 5
6.2.4 Dependencies between components . 6
6.2.5 Structure of security functional components . 6
6.2.6 List of classes . 6
6.3 Procedure to specify security functional requirements . 7
6.4 Procedure to develop functional components . 8
6.4.1 Procedure . 8
6.4.2 Existing components for privacy requirements in ISO/IEC 15408-2 . 8
6.4.3 Extended components for privacy requirements in published PP/STs and
research papers . 9
7 Privacy principles . 9
7.1 General . 9
7.2 Input for extended components . 9
7.3 Procedure to develop privacy requirements from privacy principles .10
7.4 Extended components for privacy .10
7.4.1 “Consent and choice” principle .10
7.4.2 "Purpose legitimacy and specification" principle .13
7.4.3 "Collection limitation" principle: Collecting PII .13
7.4.4 "Data minimization" and "Use, retention and disclosure limitation" principles .13
7.4.5 "Openness, transparency and notice" principle .17
7.4.6 "Individual participation and access" principle .18
7.4.7 "Accuracy and quality" principle .18
7.4.8 "Accountability" and "Privacy compliance" principles .19
7.4.9 "Information Security" principle .19
8 Summary of extended components and related privacy principles .20
8.1 General .20
8.2 Extended components - general definition .20
8.2.1 General.20
8.2.2 "Consent and choice" principle .20
8.2.3 "Data minimization" and "Use, retention and disclosure limitation" principles .21
8.2.4 "Openness, transparency and notice" principle .22
8.2.5 "Individual participation and access" principle: Challenging the accuracy
and completeness of PII .23
8.2.6 "Accuracy and quality" principle: Updating PII periodically .23
Annex A (informative) Existing components used for privacy requirements .25
Annex B (informative) Extended components for privacy in existing Protection Profiles .32
Annex C (normative) Example of extended components for privacy .36
© ISO/IEC 2018 – All rights reserved iii

Bibliography .48
iv © ISO/IEC 2018 – All rights reserved

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www .iso .org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www .iso
.org/iso/foreword .html.
This document was prepared by Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, IT Security techniques.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www .iso .org/members .html.
© ISO/IEC 2018 – All rights reserved v

Introduction
ISO/IEC 29100 defines a framework of privacy principles that should be considered when developing
systems or applications that deal with personally identifiable information (PII). This document analyses
those principles and maps them, where possible, to the security functional requirements defined in
ISO/IEC 15408-2. Where such a mapping is not possible, this document derives new security functional
requirements collected in one new class that contains several families of privacy related security
functional components following the guidance for developing new classes, families and components
provided in ISO/IEC 15408-1 and ISO/IEC 15408-2.
This document can also be used as guidance for developing further privacy functional requirements
using the framework of ISO/IEC 15408. The class, families, and components defined in this document
can be extended for cases where the components defined here are not sufficient to express specific
privacy functional requirements.
vi © ISO/IEC 2018 – All rights reserved

TECHNICAL SPECIFICATION ISO/IEC TS 19608:2018(E)
Guidance for developing security and privacy functional
requirements based on ISO/IEC 15408
1 Scope
This document provides guidance for:
— selecting and specifying security functional requirements (SFRs) from ISO/IEC 15408-2 to protect
Personally Identifiable Information (PII);
— the procedure to define both privacy and security functional requirements in a coordinated
manner; and
— developing privacy functional requirements as extended components based on the privacy principles
defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2.
The intended audience for this document are:
— developers who implement products or systems that deal with PII and want to undergo a security
evaluation of those products using ISO/IEC 15408. They will get guidance how to select security
functional requirements for the Security Target of their product or system that map to the privacy
principles defined in ISO/IEC 29100;
— authors of Protection Profiles that address the protection of PII; and
— evaluators that use ISO/IEC 15408 and ISO/IEC 18045 for a security evaluation.
This document is intended to be fully consistent with ISO/IEC 15408; however, in the event of any
inconsistency between this document and ISO/IEC 15408, the latter, as a normative standard, takes
precedence.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 15408-1, Information technology — Security techniques — Evaluation criteria for IT security —
Part 1: Introduction and general model
ISO/IEC 15408-2, Information technology — Security techniques — Evaluation criteria for IT security —
Part 2: Security functional components
ISO/IEC 18045, Information technology — Security techniques — Methodology for IT security evaluation
ISO/IEC 29100, Information technology — Security techniques — Privacy framework
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 15408 -1, ISO/IEC 18045,
ISO/IEC 29100 and the following apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https: //www .iso .org/obp
© ISO/IEC 2018 – All rights reserved 1

— IEC Electropedia: available at https: //www .electropedia .org/
3.1
privacy functional component
extended component that serves as a standard template on which to base privacy functional requirements
(3.3) for TOEs
3.2
privacy requirement
requirement, stated in a standardized language, which is meant to contribute to achieving the technical
privacy controls for a TOE based on privacy functional requirements (3.3)
3.3
privacy functional requirement
PFR
translation of the technical privacy controls for the TOE into a standardised language based on privacy
functional components (3.1)
4 Symbols and abbreviated terms
The following abbreviated terms are used in this document.
MRTD Machine Readable Travel Document
OSP Organizational Security Policy
PIA Privacy Impact Assessment
PII Personally Identifiable Information
PP Protection Profile
SPD Security problem definition
SFR Security Functional Requirement
ST Security Target
TOE Target Of Evaluation
TRA Threat Risk Assessment
TSF TOE Security Functionality
5 Purpose and structure of this document
Research shows that security and privacy should be considered from the beginning of the development
life cycle for IT products, systems and applications in order to avoid expensive rework and reduce
potential problems.
Security and privacy should also complement and mutually reinforce each other. The degree of
protection should depend on the sensitivity of data and the linkability of data to personal identifiers.
Therefore, successful implementation of security and privacy depends on defining accurate and
complete requirements for both in a coordinated manner from the start of the development.
ISO/IEC 15408-2 defines a catalogue of security functional requirements (SFRs). ISO/IEC TR 15446
also provides detailed guidance on how to specify SFRs for a Target Of Evaluation (TOE). Developers
can refer to these documents to specify SFRs to protect PII and other assets.
2 © ISO/IEC 2018 – All rights reserved

There are currently no ISO/IEC documents that specifically support privacy friendly design of IT
products, systems and applications. Guidance on deriving privacy functional requirements from the
privacy principles described in ISO/IEC 29100, as well as a procedure for defining both SFRs and
privacy functional requirements in a collaborative manner is, therefore, missing.
This document aims to fill this gap and provide guidance for developers on how to:
a) select and specify SFRs from ISO/IEC 15408-2 to protect personally identifiable information (PII)
(this guidance refers to ISO/IEC 15408 and ISO/IEC TR 15446);
b) develop new privacy functional requirements, as extended components, based on the privacy
principles defined in ISO/IEC 29100 using the paradigm described in ISO/IEC 15408-2. (This
guidance is the main focus of this document); and
c) conduct both of the above steps in a coordinated manner.
Clause 6 provides an introduction to SFRs — what they are, when and how they can be used to specify
accurate and complete security requirements.
Clause 7 explains the privacy principles defined in ISO/IEC 29100 and what privacy requirements can
be derived from these principles. These privacy requirements are formulated as privacy functional
components in Clause 8.
Clause 8 lists the privacy functional components developed in this document.
Annex A lists the security functional components in ISO/IEC 15408-2 that address privacy threats.
Annex B provides examples of PPs that define extended components to specify privacy requirements.
Annex C defines the extended privacy functional components in the format required by ISO/IEC 15408-1.
6 Requirement definition
6.1 General
Requirement definition is the first step in developing IT products, applications and systems. Security
requirements are derived to address security threats that shall be countered or to address specific
regulations or policies for the protection of PII. How far those regulations and policies are addressed
by the target of evaluation (TOE) and which requirements are assumed to be addressed by the
environment in which the TOE operates, are expressed by specifying security objectives for the TOE
and assumptions for the TOE environment. The security objectives, which are often very general, are
addressed by security requirements, which can be implemented and tested.
In ISO/IEC 15408, security requirements are expressed in the form of SFRs in the protection profile
(PP) or security target (ST). The author of a ST or PP explains how the SFRs address the security
objectives defined for the TOE. These SFRs are the core of TOE evaluations because evaluators examine
these specifications and the TOE design documents in order to determine that they are a complete and
accurate instantiation of SFRs of the TOE. Evaluators also test whether the TOE operates according to
these specifications and the design or not. TOE evaluations also include a vulnerability analysis, based
on the SFRs, in order to help the identification of vulnerabilities in the TOE. Therefore, SFRs shall be
accurate, testable and traceable so that the TOE evaluations can be conducted objectively.
While there can be occasions where privacy and security objectives are the same, they are not always
aligned. As explained in ISO/IEC 15408-1, security objectives can be derived from a threat analysis
or from organizational security policies. Whereas these policies can also define privacy requirements
which are typically derived from an analysis of relevant legislation, regulation and any organizational
privacy policies that can be in place.
ISO/IEC 15408 defines a vulnerability as a weakness in the TOE that can be used to violate the security
objectives or SFRs in some environment that satisfies the assumptions defined for the TOE environment.
© ISO/IEC 2018 – All rights reserved 3

A vulnerability analysis therefore focuses on the detection of scenarios where the security objectives
are not met although all SFRs are correctly implemented and all assumptions made for the TOE
environment are satisfied.
EXAMPLE Examples of such vulnerabilities are implementation side effects like incomplete parameter
validation or design side effects like covert communication channels that can be used to obtain information in
violation of a defined information flow policy.
The following subclauses provide readers with minimum knowledge of the concept of SFRs so that
readers can understand the content of this document, minimizing the need to refer to other documents.
Most of descriptions in the following subclauses are extracted as a summary from ISO/IEC 15408 and
ISO/IEC TR 15446.
6.2 Security functional requirements (SFRs)
6.2.1 General
The TOE implements security functions to protect its assets from unauthorized disclosure, modification,
or loss of use. SFRs are the requirements for those security functions that the TOE security functionality
(TSF) shall provide.
NOTE The TSF is the part of the TOE that implements the SFRs.
ISO/IEC 15408-1 provides a framework to define SFRs, in a standardized language in order to ensure
exactness and facilitate the comparability of security requirements. ISO/IEC 15408-2 then provides a
catalogue of security functional components which are the basis for the SFRs. PP/ST authors select an
appropriate set of security functional components from this catalogue for their TOE and tailor these
security functional components through operations (see 6.2.3) in order to meet their needs and to
ensure that the specification of security requirements in the form of SFRs is complete.
TOE evaluations determine if the TOE actually meets the all of these SFRs through the evaluation
activities defined in ISO/IEC 18045.
NOTE Evaluation activities include the review of the PP/ST, specification, functional testing and vulnerability
analysis.
The catalogue of SFRs defined in ISO/IEC 15408-2 covers many aspects of security functionality but also
allows for the specification of additional SFRs that are not in this catalogue. The framework provided in
ISO/IEC 15408-1 shall be used to define additional SFRs for a security functionality that is not covered
by the SFRs defined in ISO/IEC 15408-2.
6.2.2 Example of security functional requirements
Figure 1 gives an example of a security functional component provided in ISO/IEC 15408-2.
EXAMPLE 1
FIA_AFL.1 Authentication failure handling
Hierarchical to: No other components.
Dependencies: FIA_UAU.1 Timing of authentication
FIA_AFL.1.1 The TSF shall detect when [selection: [assignment: positive integer number]], an administrator
configurable positive integer within [assignment: range of acceptable values] unsuccessful authentication
attempts occur related to [assignment: list of authentication events].
FIA_AFL.1.2 When the defined number of unsuccessful authentication attempts has been [selection: met,
surpassed], the TSF shall [assignment: list of actions].
Figure 1 — Security functional component for authentication failure handling
4 © ISO/IEC 2018 – All rights reserved

FIA_AFL.1 is a component for authentication failure handling. This component requires that the TSF
be able to terminate the session establishment process after a specified number of unsuccessful user
authentication attempts. It also requires that, after termination of the session establishment process,
the TSF be able to disable the user account or the point of entry from which the attempts were made
until an administrator-defined condition occurs.
EXAMPLE 2 An example of a point of entry is a work station.
6.2.3 The selection, assignment, refinement and iteration operations
ISO/IEC 15408 permits a degree of flexibility in the way the SFRs are specified by allowing PP/ST
authors to tailor the security requirement appropriately. In FIA_AFL.1, PP/ST authors can specify
appropriate variables and actions after the word "assignment:" and select appropriate elements from
several items specified after the word "selection:" to complete the security requirement.
EXAMPLE 1 If the TOE needs to lockout telnet administrator's login after 3 unsuccessful login attempts, PP/ST
authors assign and select appropriate values or items as follows:
FIA_AFL.1.1 The TSF shall detect when [3] unsuccessful authentication attempts occur related to [authentication
of the telnet administrator].
FIA_AFL.1.2 When the defined number of unsuccessful authentication attempts has been [met], the TSF shall
[lockout the telnet administrator’s login].
Figure 2 — A completed SFR for authentication failure handling
PP/ST authors can also tailor the requirement using the refinement operation under the following
restrictions:
a) a TOE meeting the refined requirement also meets the unrefined requirement in the context of the
PP/ST (i.e. a refined requirement must be “stricter” than the original requirement); and
b) refinement shall be related to the original component.
EXAMPLE 2 An example of a valid refinement is shown in Figure 3.
In ISO/IEC 15408-2;
FIA_UAU.2.1 The TSF shall require each user to be successfully authenticated before allowing any other TSF-
mediated actions on behalf of that user.”
being refined to:
FIA_UAU.2.1 The TSF shall require each user to be successfully authenticated by username/password before
allowing any other TSF-mediated actions on behalf of that user.
Figure 3 — Example of the refined SFR for timing of authentication
The PP/ST authors can use the same functional component to express two or more distinct
requirements for the TOE. Each iteration of a component shall be different from all other iterations of
that component, which is realized by completing assignments and selections in a different way, or by
applying refinements to it in a different way.
ISO/IEC 15408 does not provide any other methods to tailor the SFRs other than selection, assignment,
and refinement operations. However, there can be security requirements for the TOE that existing
components in ISO/IEC 15408-2 cannot cover. In this case, new components (extended components)
shall be defined in the PP/ST.
© ISO/IEC 2018 – All rights reserved 5

6.2.4 Dependencies between components
Dependencies can exist between security functional components. Dependencies arise when a
component is not self-sufficient and relies on the presence of another component to provide security
functionality.
EXAMPLE 1 As shown in Figure 1, FIA_AFL.1 has a dependency to "FIA_UAU.1 Timing of authentication" that
is a component for user authentication because the TOE must authenticate users before detecting unsuccessful
authentication attempts.
EXAMPLE 2 In FAU_GEN.1 (Audit data generation) and FPT_STM.1 (Reliable time stamps). FAU_GEN.1 requires
that for audit record generation and has a dependency to FPT_STM.1 because FAU_GEN.1 requires the inclusion
of the date and time of the event in each audit record. Such time stamps must be reliable in order to provide the
correct date and time of the event.
If FIA_AFL.1 is selected in the PP/ST, then the PP/ST authors shall either include FIA_UAU.1 in the PP/
ST or provide a justification as to why the PP/ST does not contain FIA_UAU.1. The same is true for FAU_
GEN.1 and FPT_STM.1.
6.2.5 Structure of security functional components
In ISO/IEC 15408-2 the security functional components are organized into hierarchical structures:
— classes; consisting of
— families; consisting of
— components; consisting of
— elements.
ISO/IEC 15408-2 contains classes of families and components, which are rough groupings on the basis
of related function or purpose.
EXAMPLE
Two elements, FIA_AFL.1.1 and FIA_AFL.1.2, belong to the security functional component FIA_AFL.1. FIA_AFL.1
belongs to the FIA_AFL family that contains requirements for defining values for some number of unsuccessful
authentication attempts and TSF actions in cases of authentication attempt failures. This FIA_AFL family also
belongs to the FIA (Identification and authentication) class that addresses the requirements for functions to
establish and verify a claimed user identity. This FIA class includes other relevant families such as FIA_UAU (User
authentication), FIA_UID (User identification) and FIA_SOS (Specification of secrets).
This organization into a hierarchy of class-family-component-element is provided to assist PP/ST authors
in locating specific components. ISO/IEC 15408-2 presents all of the security functional components in
the same general hierarchical style and uses the same organization and terminology for each.
6.2.6 List of classes
ISO/IEC 15408-2 defines the following classes which cover a broad spectrum of security requirements.
6 © ISO/IEC 2018 – All rights reserved

Table 1 — List of classes
Class name Security requirements
FAU: Security audit Requirements for security auditing involving recognizing, recording,
storing, and analysing information related to security-relevant activities
to determine which security-relevant activities took place and who is
responsible for them.
FCO: Communication Requirements concerned with assuring the identity of a party participating
in a data exchange which are the originator of transmitted information and
identity of the recipient of transmitted information.
FCS: Cryptographic support Requirements for cryptographic functionality to help satisfy other security
components belong to other classes. Components in this class are used when
the TOE implements cryptographic functions, the implementation of which
can be in hardware, firmware and/or software.
FDP: User data protection Requirements related to protecting user data and split into four groups of
families that address user data within a TOE, during import, export, and
storage as well as security attributes directly related to user data.
FIA: Identification and Requirements for functions to establish and verify a claimed user identity.
authentication
Identification and Authentication is required to ensure that users are associated
with the proper security attributes.
EXAMPLE  Security attributes include identity, groups, roles, security, and
integrity levels.
FMT: Security management Requirements to specify the management of several aspects of the TSF:
security attributes, TSF data and functions. The different management roles
and their interaction, such as separation of capability, can be specified
FPR: Privacy This class contains privacy requirements. These requirements provide a
user protection against discovery and misuse of identity by other users.
FPT: Protection of the TSF Requirements that relate to the integrity and management of the
mechanisms that constitute the TSF and to the integrity of TSF data. In some
sense, families in this class can appear to duplicate components in the FDP.
FRU: Resource utilization Requirements that support the availability of required resources such as
processing capability and/or storage capacity.
FTA: TOE access Requirements for controlling the establishment of a user's session such as
limiting number of concurrent sessions that belong to the same user.
FTP: Trusted path/channels Requirements for a trusted communication path between users and the TSF
and for a trusted communication channel between the TSF and other trusted
IT products.
6.3 Procedure to specify security functional requirements
It is expected that PPs and STs are developed in a logical “top-down” manner such that:
a) the security problem is first defined;
b) the security objectives are then identified to address the security problem; and
c) the security requirements are then defined to satisfy the security objectives for the TOE.
In the security problem definition (SPD), the PP/ST authors define the threats to the assets that the
TOE shall protect and the organizational security policies (OSP) that the TOE shall comply with. This is
done by:
a) identifying the security objectives that address the threats and security policies; and
b) translating these security objectives into SFRs in the PP/ST.
Therefore, PP/ST authors shall include an appropriate set of threats and security organizational policies
in the security problem definition in order to enable the specification SFRs for the TOE.
© ISO/IEC 2018 – All rights reserved 7

However, ISO/IEC 15408 does not assume or mandate any particular process or methodology for
preparing the security problem definition and so PP/ST authors can use any method they like. ISO/
IEC TR 15446 includes a detailed description of a simple methodology to define the security problem
that has been tried and tested in practice and found to work in a variety of organizations and
environments.
6.4 Procedure to develop functional components
6.4.1 Procedure
During specification of the SFRs, it is possible that PP/ST authors are not able to correctly specify a
requirement even when using the freedom given in refining existing components from ISO/IEC 15408-2.
In this case, ISO/IEC 15408-1 allows for the definition of extended components. However, PP/ST authors
cannot define extended components freely. As part of an evaluation, extended components defined in
a PP/ST shall be evaluated in order to determine if the extended components are necessary (i.e. that
they cannot be clearly expressed using existing ISO/IEC 15408-2 components), and if such extended
components are necessary, that they have been clearly and unambiguously defined.
Before defining extended components, PP/ST authors should:
a) first attempt to use existing components from ISO/IEC 15408-2, potentially with refinements.
Extended components can be used only in cases where this is either not possible or becomes too
complicated. Annex A shows examples of existing components that have been used to address
privacy threats.
b) investigate extended components in evaluated and published PPs/STs to check if an extended
component has already been defined that the PP/ST authors can use. Taking an already defined
extended component from an evaluated PP/ST has the advantage that the component itself has
already been checked for consistency and conformance against the requirements of the ISO/
IEC 15408 series as part of the evaluation of the PP/ST that contained it. Annex B shows examples
of extended components defined in PPs/STs that have been used to address privacy threats.
When defining new extended components, PP/ST authors should:
a) define components in a similar way to existing components in ISO/IEC 15408-2. This applies to the
naming of the extended component, the way they are expressed and the level of detail provided.
It is therefore recommended to describe an extended component using the same structure that is
given in ISO/IEC 15408-2.
b) define components in such a way that they are testable and traceable through the appropriate TSF
representations (i.e., the specification and design documentation of TOE).
c) identify the functional components that are needed along with any newly defined components that
satisfy the security requirements associated with the extended component and specify them in the
dependency list.
All terms in the extended components should be well defined in order to avoid any misunderstanding
due to the introduction of vague terms. This is because vague terms are neither testable nor traceable.
6.4.2 Existing components for privacy requirements in ISO/IEC 15408-2
The class FPR (Privacy) is directly related to privacy requirements. This class includes the families
shown in Table 2 that provide privacy requirements for a user protection against discovery and misuse
of identity by other users.
8 © ISO/IEC 2018 – All rights reserved

Table 2 — FPR Families
FPR family name Related requirements
Anonymity (FPR_ANO) This family ensures that a user can use a resource or service without disclosing
the user's identity. The requirements for anonymity provide protection of the
user identity.
Pseudonymity (FPR_PSE) This family ensures that a user can use a resource or service without disclosing
its user identity but can still be accountable for that use.
Unlinkability (FPR_UNL) This family ensures that a user can make multiple uses of resources or services
without others being able to link these uses together.
Unobservability (FPR_UNO) This family ensures that a user can use a resource or service without others,
especially third parties, being able to observe that the resource or service is
being used.
The other classes listed in Table 1, such as FIA, can also be used to address privacy objectives. As
described in 6.3, PP/ST authors define the "security" problem that describes threats to confidentiality,
integrity, and availability of informational assets. However, ISO/IEC 15408-1 and ISO/IEC 15408-2 are
flexible enough to also cover privacy threats and hence for the PP/ST authors to identify corresponding
functional components that address such privacy threats. Annex A gives examples of the use of existing
functional components in addressing privacy threats such as location tracking of users.
6.4.3 Extended components for privacy requirements in published PP/STs and research papers
As explained in 6.4.1 b), extended components in evaluated PPs/STs should be used when possible.
There are many PPs/STs published in various catalogues. However, very few PPs/STs define extended
components for privacy threats. Two such PPs and their extended components are listed in Annex B.
[1]
EXAMPLE A commonly used catalogue is the Common Criteria portal .
7 Privacy principles
7.1 General
Security functional components defined in ISO/IEC 15408-2 serve as a "common language" among
consumers, developers, and evaluators for expressing security requirements for the TOE. However,
as described in 6.4.2, ISO/IEC 15408-2 only defines a limited set of security functional components to
address privacy threats.
This document provides extended components that can serve as the "common language" for privacy
requirements. PP/ST authors can specify both security and privacy requirements at the same time and
still achieve the same level of quality expressed in ISO/IEC 15408-2, by using the extended components
defined in this document.
7.2 Input for extended components
ISO/IEC 29100 describes privacy principles derived from existing principles that have been developed by
a number of states, countries, and international organizations. These privacy principles should be used
to guide the design, development, and implementation of privacy controls. This document considered
all of the privacy principles given in ISO/IEC 29100 in order to identify the privacy requirements given
in this document. However, only those requirements that can be objectively tested in TOE evaluations
are included in this document.
This document assumes that PP/ST authors determine the following items based on the purpose of
the TOE. In this document, extended components have been developed with the assumption that the
following were well defined in advance:
a) the purpose(s) of processing PII: PP/ST authors define the legitimate purposes for processing of PII;
© ISO/IEC 2018 – All rights reserved 9

b) the minimum set of PII that the TOE needs to process: PP/ST authors identify the minimum set of
PII that the TOE needs to process for the specified purposes.
7.3 Procedure to develop privacy requirements from privacy principles
This document applied the following procedure to develop privacy functional components based on the
guidance described in 6.4.1:
a) derivation of privacy requirements from each privacy principle. Such requirements are described
using defined terms in ISO/IEC 15408 and ISO/IEC 29100 in italic font as source text;
b) identification of existing functional components in ISO/IEC 15408-2 or of extended components
found in published PPs/STs that can be used to express these requirements;
c) formulation of the privacy requirements as new extended components if existing components are
not applicable.
7.4 Extended components for privacy
7.4.1 “Consent and choice” principle
7.4.1.1 General
The methods, timing of choice and conditions of consent should be determined by PP/ST authors
considering any applicable law, the sensitivity of the PII and other factors.
7.4.1.2 Presenting choice and obtaining consent
The TOE can implement functionality to present one or more choices to PII principals regarding the
processing of their PII and to obtain their consent for such processing.
There can be legal requirements in some jurisdictions. These legal requirements shall be considered in
the development of any mechanisms intended to facilitate the obtaining of consent.
EXAMPLE Some legal requirements express that consent must be informed, freely given and specific.
There are a number of different methods used to implement the choice and consent principle. However,
choice and consent should be presented at a time and in a context that is relevant to the PII principals'
decision about whether to permit PII collection. Choice and consent should be also presented to PII
principals in a prominent and easily accessible place. Consent and choice assumes that the PII principal
is aware of the organization's privacy practices, which shall be described in the notice that is made
available to the PII principal. For more information about the purpose and content of the notice, see
ISO/IEC 29100:2011, 4.6. If conditions of consent described in the notice are related to other functional
components, PP/ST authors shall include such components in the PP/ST.
EXAMPLE 1 An example of a method to implement choice and consent is opt-in and opt-out.
EXAMPLE 2 An example where conditions of consent are related to other functional components is the means
offered for accessing PII (7.4.5.1) and retention period of PII [7.4.4.1 f)].
The access control policy defined for PII is applicable.
Expression of the requirement
The requirement can be expressed as follows:
The TSF shall provide choice and obtain consent for the processing of PII through methods, timing and
conditions specified by PP/ST authors.
PP/ST authors may iterate the above component, using the iteration operation, if the TOE implements
different types of choice and consent for different types of PII.
10 © ISO/IEC 2018 – All rights reserved

Applicable security functional components
ISO/IEC 15408-2 does not define any functional components for this requirement because the ISO/
IEC 15408 functional requirements paradigm
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

Frequently Asked Questions

ISO/IEC TS 19608:2018 is a technical specification published by the International Organization for Standardization (ISO). Its full title is "Guidance for developing security and privacy functional requirements based on ISO/IEC 15408". This standard covers: This document provides guidance for: — selecting and specifying security functional requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII); — the procedure to define both privacy and security functional requirements in a coordinated manner; and — developing privacy functional requirements as extended components based on the privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2. The intended audience for this document are: — developers who implement products or systems that deal with PII and want to undergo a security evaluation of those products using ISO/IEC 15408. They will get guidance how to select security functional requirements for the Security Target of their product or system that map to the privacy principles defined in ISO/IEC 29100; — authors of Protection Profiles that address the protection of PII; and — evaluators that use ISO/IEC 15408 and ISO/IEC 18045 for a security evaluation. This document is intended to be fully consistent with ISO/IEC 15408; however, in the event of any inconsistency between this document and ISO/IEC 15408, the latter, as a normative standard, takes precedence.

This document provides guidance for: — selecting and specifying security functional requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII); — the procedure to define both privacy and security functional requirements in a coordinated manner; and — developing privacy functional requirements as extended components based on the privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2. The intended audience for this document are: — developers who implement products or systems that deal with PII and want to undergo a security evaluation of those products using ISO/IEC 15408. They will get guidance how to select security functional requirements for the Security Target of their product or system that map to the privacy principles defined in ISO/IEC 29100; — authors of Protection Profiles that address the protection of PII; and — evaluators that use ISO/IEC 15408 and ISO/IEC 18045 for a security evaluation. This document is intended to be fully consistent with ISO/IEC 15408; however, in the event of any inconsistency between this document and ISO/IEC 15408, the latter, as a normative standard, takes precedence.

ISO/IEC TS 19608:2018 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 35.040 - Information coding. The ICS classification helps identify the subject area and facilitates finding related standards.

You can purchase ISO/IEC TS 19608:2018 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

The article discusses ISO/IEC TS 19608:2018, which provides guidance for developing security and privacy functional requirements based on ISO/IEC 15408. The document helps select and specify security requirements to protect personally identifiable information (PII) and explains the procedure for defining privacy and security functional requirements together. It also guides the development of privacy requirements as extended components based on the privacy principles defined in ISO/IEC 29100. The intended audience includes developers, authors of Protection Profiles, and evaluators who work with PII and want to undergo a security evaluation using ISO/IEC 15408. The document aims to be consistent with ISO/IEC 15408, but in case of any inconsistency, ISO/IEC 15408 takes precedence as a normative standard.

ISO/IEC TS 19608:2018에 대한 기사를 요약하면 다음과 같습니다. 이 문서는 ISO/IEC 15408을 기반으로 보안 및 개인 정보 보호 기능 요구 사항을 개발하기 위한 지침을 제공합니다. 이 문서는 개인 식별 정보 (PII)를 보호하기 위해 ISO/IEC 15408-2에서 보안 기능 요구 사항(SFRs)을 선택하고 명시하는 방법, 개인 정보 보호 및 보안 기능 요구 사항을협력적으로 정의하는 절차, ISO/IEC 29100에서 정의된 개인 정보 보호 원칙을 기반으로 개인 정보 보호 기능 요구 사항을 확장 구성 요소로 개발하는 방법을 안내합니다. 이 문서의 대상 독자는 다음과 같습니다. PII를 다루는 제품이나 시스템을 구현하는 개발자들은 ISO/IEC 15408을 사용하여 제품의 보안 평가를 수행하고자 할 때, ISO/IEC 29100에서 정의된 개인 정보 보호 원칙과 일치하는 보안 기능 요구 사항을 제품 또는 시스템의 보안 대상에 선택하는 방법에 대한 지침을 얻게 됩니다. 또한 PII의 보호를 다루는 보호 프로파일 작성자 및 보안 평가에 ISO/IEC 15408과 ISO/IEC 18045를 사용하는 평가자들 또한 이 문서를 활용할 수 있습니다. 이 문서는 ISO/IEC 15408과 완전히 일치하도록 의도되었지만, 이 문서와 ISO/IEC 15408 사이에 일관성에 모순이 있는 경우, 후자가 규범적 표준으로 우선시됩니다.

以下の記事の要点を日本語で要約します。 記事タイトル:ISO/IEC TS 19608:2018 - ISO/IEC 15408に基づくセキュリティとプライバシーの機能要件の開発に関するガイダンス 記事内容:この文書は、ISO/IEC 15408に基づいてセキュリティとプライバシーの機能要件を開発するためのガイダンスを提供します。具体的には、ISO/IEC 15408-2から個人識別情報(PII)を保護するためのセキュリティの機能要件(SFRs)を選択し、指定する方法、セキュリティとプライバシーの機能要件を協調的に定義する手順、ISO/IEC 15408-2で定義されたプライバシーの原則に基づいて拡張コンポーネントとしてプライバシーの機能要件を開発する方法についてガイダンスします。この文書の対象読者は以下の通りです。PIIを取り扱う製品やシステムを実装する開発者は、ISO/IEC 15408を使用して製品のセキュリティ評価を行いたい場合、ISO/IEC 29100で定義されたプライバシーの原則と一致するセキュリティの機能要件を製品またはシステムのセキュリティターゲットに選択するためのガイダンスを提供します。また、PIIの保護を対象とする保護プロファイルの作成者や、セキュリティ評価にISO/IEC 15408とISO/IEC 18045を使用する評価者も、この文書を活用することができます。この文書はISO/IEC 15408と完全に一致することを意図していますが、もし文書とISO/IEC 15408の間に矛盾がある場合、後者が規範的な標準として優先されます。