ImageVerifierCode 换一换
格式:PDF , 页数:188 ,大小:3.06MB ,
资源ID:1029445      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1029445.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(SANS 15408-3-2009 Information technology - Security techniques - Evaluation criteria for IT security Part 3 Security assurance components《信息技术 安全技术 IT安全性评价标准 第3部分 安全保证组件》.pdf)为本站会员(appealoxygen216)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

SANS 15408-3-2009 Information technology - Security techniques - Evaluation criteria for IT security Part 3 Security assurance components《信息技术 安全技术 IT安全性评价标准 第3部分 安全保证组件》.pdf

1、 Collection of SANS standards in electronic format (PDF) 1. Copyright This standard is available to staff members of companies that have subscribed to the complete collection of SANS standards in accordance with a formal copyright agreement. This document may reside on a CENTRAL FILE SERVER or INTRA

2、NET SYSTEM only. Unless specific permission has been granted, this document MAY NOT be sent or given to staff members from other companies or organizations. Doing so would constitute a VIOLATION of SABS copyright rules. 2. Indemnity The South African Bureau of Standards accepts no liability for any

3、damage whatsoever than may result from the use of this material or the information contain therein, irrespective of the cause and quantum thereof. ISBN 978-0-626-22332-8 SANS 15408-3:2009 Edition 3 ISO/IEC 15408-3: 2008 Edition 3 SOUTH AFRICAN NATIONAL STANDARD Information technology Security techni

4、ques Evaluation criteria for IT security Part 3: Security assurance components This national standard is the identical implementation of ISO/IEC 15408-3:2008 and is adopted with the permission of the International Organization for Standardization and the International Electrotechnical Commission. Pu

5、blished by SABS Standards Division 1 Dr Lategan Road Groenkloof envelopeback Private Bag X191 Pretoria 0001 Tel: +27 12 428 7911 Fax: +27 12 344 1568 www.sabs.co.za SABS SANS 15408-3:2009 Edition 3 ISO/IEC 15408-3:2008 Edition 3 Table of changes Change No. Date Scope National foreword This South Afr

6、ican standard was approved by National Committee SABS SC 71F, Information technology - Information security, in accordance with procedures of the SABS Standards Division, in compliance with annex 3 of the WTO/TBT agreement. This SANS document was published in June 2009. This SANS document supersedes

7、 SANS 15408-3:2007(edition 2). Reference numberISO/IEC 15408-3:2008(E)ISO/IEC 2008INTERNATIONAL STANDARD ISO/IEC15408-3Third edition2008-08-15Information technology Security techniques Evaluation criteria for IT security Part 3: Security assurance components Technologies de linformation Techniques d

8、e scurit Critres dvaluation pour la scurit TI Partie 3: Composants dassurance de scurit SANS 15408-3:2009This s tandard may only be used and printed by approved subscription and freemailing clients of the SABS .ISO/IEC 15408-3:2008(E) PDF disclaimer This PDF file may contain embedded typefaces. In a

9、ccordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobe

10、s licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for p

11、rinting. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2008 All rights reserved. Unless o

12、therwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyr

13、ight office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2008 All rights reservedSANS 15408-3:2009This s tandard may only be used and printed by approved subscription and freemailing clients

14、 of the SABS .ISO/IEC 15408-3:2008(E) ISO/IEC 2008 All rights reserved iiiContents Page 1 Scope 1 2 Normative references 1 3 Terms and definitions, symbols and abbreviated terms . 1 4 Overview . 1 4.1 Organisation of this part of ISO/IEC 15408 . 1 5 Assurance paradigm . 2 5.1 ISO/IEC 15408 philosoph

15、y 2 5.2 Assurance approach . 2 5.2.1 Significance of vulnerabilities 2 5.2.2 Cause of vulnerabilities 3 5.2.3 ISO/IEC 15408 assurance 3 5.2.4 Assurance through evaluation . 3 5.3 ISO/IEC 15408 evaluation assurance scale. 3 6 Security assurance components . 4 6.1 Security assurance classes, families

16、and components structure . 4 6.1.1 Assurance class structure 4 6.1.2 Assurance family structure 5 6.1.3 Assurance component structure . 6 6.1.4 Assurance elements 8 6.1.5 Component taxonomy . 8 6.2 EAL structure . 8 6.2.1 EAL name . 9 6.2.2 Objectives 9 6.2.3 Application notes 9 6.2.4 Assurance comp

17、onents 9 6.2.5 Relationship between assurances and assurance levels . 10 6.3 CAP structure 10 6.3.1 CAP name . 11 6.3.2 Objectives 11 6.3.3 Application notes 11 6.3.4 Assurance components 11 6.3.5 Relationship between assurances and assurance levels . 12 7 Evaluation assurance levels 12 7.1 Evaluati

18、on assurance level (EAL) overview . 13 7.2 Evaluation assurance level details 14 7.3 Evaluation assurance level 1 (EAL1) - functionally tested 14 7.3.1 Objectives 14 7.3.2 Assurance components 15 7.4 Evaluation assurance level 2 (EAL2) - structurally tested 15 7.4.1 Objectives 15 7.4.2 Assurance com

19、ponents 15 7.5 Evaluation assurance level 3 (EAL3) - methodically tested and checked . 16 7.5.1 Objectives 16 7.5.2 Assurance components 16 7.6 Evaluation assurance level 4 (EAL4) - methodically designed, tested, and reviewed . 17 7.6.1 Objectives 17 7.6.2 Assurance components 17 7.7 Evaluation assu

20、rance level 5 (EAL5) - semiformally designed and tested . 18 7.7.1 Objectives 18 7.7.2 Assurance components 18 7.8 Evaluation assurance level 6 (EAL6) - semiformally verified design and tested 19 SANS 15408-3:2009This s tandard may only be used and printed by approved subscription and freemailing cl

21、ients of the SABS .ISO/IEC 15408-3:2008(E) iv ISO/IEC 2008 All rights reserved7.8.1 Objectives 19 7.8.2 Assurance components . 19 7.9 Evaluation assurance level 7 (EAL7) - formally verified design and tested . 20 7.9.1 Objectives 20 7.9.2 Assurance components . 20 8 Composed assurance packages . 21

22、8.1 Composed assurance package (CAP) overview . 22 8.2 Composed assurance package details 23 8.3 Composition assurance level A (CAP-A) - Structurally composed . 23 8.3.1 Objectives 23 8.3.2 Assurance components . 23 8.4 Composition assurance level B (CAP-B) - Methodically composed . 24 8.4.1 Objecti

23、ves 24 8.4.2 Assurance components . 24 8.5 Composition assurance level C (CAP-C) - Methodically composed, tested and reviewed 25 8.5.1 Objectives 25 8.5.2 Assurance components . 25 9 Class APE: Protection Profile evaluation . 26 9.1 PP introduction (APE_INT) 27 9.1.1 Objectives 27 9.1.2 APE_INT.1 PP

24、 introduction 27 9.2 Conformance claims (APE_CCL) 27 9.2.1 Objectives 27 9.2.2 APE_CCL.1 Conformance claims 27 9.3 Security problem definition (APE_SPD) . 29 9.3.1 Objectives 29 9.3.2 APE_SPD.1 Security problem definition 29 9.4 Security objectives (APE_OBJ) . 30 9.4.1 Objectives 30 9.4.2 Component

25、levelling 30 9.4.3 APE_OBJ.1 Security objectives for the operational environment . 30 9.4.4 APE_OBJ.2 Security objectives 30 9.5 Extended components definition (APE_ECD) . 31 9.5.1 Objectives 31 9.5.2 APE_ECD.1 Extended components definition . 32 9.6 Security requirements (APE_REQ) . 32 9.6.1 Object

26、ives 32 9.6.2 Component levelling 33 9.6.3 APE_REQ.1 Stated security requirements . 33 9.6.4 APE_REQ.2 Derived security requirements . 34 10 Class ASE: Security Target evaluation. 35 10.1 ST introduction (ASE_INT) . 35 10.1.1 Objectives 35 10.1.2 ASE_INT.1 ST introduction 35 10.2 Conformance claims

27、(ASE_CCL) 36 10.2.1 Objectives 36 10.2.2 ASE_CCL.1 Conformance claims 37 10.3 Security problem definition (ASE_SPD) . 38 10.3.1 Objectives 38 10.3.2 ASE_SPD.1 Security problem definition 38 10.4 Security objectives (ASE_OBJ) . 39 10.4.1 Objectives 39 10.4.2 Component levelling 39 10.4.3 ASE_OBJ.1 Se

28、curity objectives for the operational environment . 39 10.4.4 ASE_OBJ.2 Security objectives 39 10.5 Extended components definition (ASE_ECD) . 40 10.5.1 Objectives 40 10.5.2 ASE_ECD.1 Extended components definition . 40 SANS 15408-3:2009This s tandard may only be used and printed by approved subscri

29、ption and freemailing clients of the SABS .ISO/IEC 15408-3:2008(E) ISO/IEC 2008 All rights reserved v10.6 Security requirements (ASE_REQ) 41 10.6.1 Objectives 41 10.6.2 Component levelling . 42 10.6.3 ASE_REQ.1 Stated security requirements 42 10.6.4 ASE_REQ.2 Derived security requirements . 42 10.7

30、TOE summary specification (ASE_TSS) . 44 10.7.1 Objectives 44 10.7.2 Component levelling . 44 10.7.3 ASE_TSS.1 TOE summary specification . 44 10.7.4 ASE_TSS.2 TOE summary specification with architectural design summary 44 11 Class ADV: Development 45 11.1 Security Architecture (ADV_ARC) . 50 11.1.1

31、Objectives 50 11.1.2 Component levelling . 50 11.1.3 Application notes 50 11.1.4 ADV_ARC.1 Security architecture description . 51 11.2 Functional specification (ADV_FSP) . 52 11.2.1 Objectives 52 11.2.2 Component levelling . 52 11.2.3 Application notes 52 11.2.4 ADV_FSP.1 Basic functional specificat

32、ion . 54 11.2.5 ADV_FSP.2 Security-enforcing functional specification . 55 11.2.6 ADV_FSP.3 Functional specification with complete summary 56 11.2.7 ADV_FSP.4 Complete functional specification 57 11.2.8 ADV_FSP.5 Complete semi-formal functional specification with additional error information . 58 11

33、.2.9 ADV_FSP.6 Complete semi-formal functional specification with additional formal specification . 59 11.3 Implementation representation (ADV_IMP) 61 11.3.1 Objectives 61 11.3.2 Component levelling . 61 11.3.3 Application notes 61 11.3.4 ADV_IMP.1 Implementation representation of the TSF . 62 11.3.

34、5 ADV_IMP.2 Complete mapping of the implementation representation of the TSF . 62 11.4 TSF internals (ADV_INT) . 63 11.4.1 Objectives 63 11.4.2 Component levelling . 63 11.4.3 Application notes 63 11.4.4 ADV_INT.1 Well-structured subset of TSF internals 64 11.4.5 ADV_INT.2 Well-structured internals

35、. 65 11.4.6 ADV_INT.3 Minimally complex internals . 66 11.5 Security policy modelling (ADV_SPM) 67 11.5.1 Objectives 67 11.5.2 Component levelling . 67 11.5.3 Application notes 67 11.5.4 ADV_SPM.1 Formal TOE security policy model . 68 11.6 TOE design (ADV_TDS) 69 11.6.1 Objectives 69 11.6.2 Componen

36、t levelling . 69 11.6.3 Application notes 69 11.6.4 ADV_TDS.1 Basic design 70 11.6.5 ADV_TDS.2 Architectural design . 71 11.6.6 ADV_TDS.3 Basic modular design 72 11.6.7 ADV_TDS.4 Semiformal modular design 74 11.6.8 ADV_TDS.5 Complete semiformal modular design . 75 11.6.9 ADV_TDS.6 Complete semiforma

37、l modular design with formal high-level design presentation . 76 12 Class AGD: Guidance documents . 78 12.1 Operational user guidance (AGD_OPE) 78 SANS 15408-3:2009This s tandard may only be used and printed by approved subscription and freemailing clients of the SABS .ISO/IEC 15408-3:2008(E) vi ISO

38、/IEC 2008 All rights reserved12.1.1 Objectives 78 12.1.2 Component levelling 78 12.1.3 Application notes 79 12.1.4 AGD_OPE.1 Operational user guidance . 79 12.2 Preparative procedures (AGD_PRE) . 80 12.2.1 Objectives 80 12.2.2 Component levelling 80 12.2.3 Application notes 80 12.2.4 AGD_PRE.1 Prepa

39、rative procedures 81 13 Class ALC: Life-cycle support . 81 13.1 CM capabilities (ALC_CMC) . 82 13.1.1 Objectives 82 13.1.2 Component levelling 82 13.1.3 Application notes 83 13.1.4 ALC_CMC.1 Labelling of the TOE . 83 13.1.5 ALC_CMC.2 Use of a CM system 84 13.1.6 ALC_CMC.3 Authorisation controls 85 1

40、3.1.7 ALC_CMC.4 Production support, acceptance procedures and automation 86 13.1.8 ALC_CMC.5 Advanced support . 88 13.2 CM scope (ALC_CMS) 90 13.2.1 Objectives 90 13.2.2 Component levelling 91 13.2.3 Application notes 91 13.2.4 ALC_CMS.1 TOE CM coverage 91 13.2.5 ALC_CMS.2 Parts of the TOE CM covera

41、ge . 91 13.2.6 ALC_CMS.3 Implementation representation CM coverage 92 13.2.7 ALC_CMS.4 Problem tracking CM coverage . 93 13.2.8 ALC_CMS.5 Development tools CM coverage . 94 13.3 Delivery (ALC_DEL) 95 13.3.1 Objectives 95 13.3.2 Component levelling 95 13.3.3 Application notes 95 13.3.4 ALC_DEL.1 Deli

42、very procedures . 96 13.4 Development security (ALC_DVS) 96 13.4.1 Objectives 96 13.4.2 Component levelling 96 13.4.3 Application notes 96 13.4.4 ALC_DVS.1 Identification of security measures . 97 13.4.5 ALC_DVS.2 Sufficiency of security measures . 97 13.5 Flaw remediation (ALC_FLR) . 98 13.5.1 Obje

43、ctives 98 13.5.2 Component levelling 98 13.5.3 Application notes 98 13.5.4 ALC_FLR.1 Basic flaw remediation 98 13.5.5 ALC_FLR.2 Flaw reporting procedures 99 13.5.6 ALC_FLR.3 Systematic flaw remediation . 100 13.6 Life-cycle definition (ALC_LCD) 102 13.6.1 Objectives 102 13.6.2 Component levelling 10

44、2 13.6.3 Application notes 102 13.6.4 ALC_LCD.1 Developer defined life-cycle model 103 13.6.5 ALC_LCD.2 Measurable life-cycle model . 104 13.7 Tools and techniques (ALC_TAT) . 104 13.7.1 Objectives 104 13.7.2 Component levelling 105 13.7.3 Application notes 105 13.7.4 ALC_TAT.1 Well-defined developm

45、ent tools . 105 13.7.5 ALC_TAT.2 Compliance with implementation standards . 106 13.7.6 ALC_TAT.3 Compliance with implementation standards - all parts 106 SANS 15408-3:2009This s tandard may only be used and printed by approved subscription and freemailing clients of the SABS .ISO/IEC 15408-3:2008(E)

46、 ISO/IEC 2008 All rights reserved vii14 Class ATE: Tests . 107 14.1 Coverage (ATE_COV) 108 14.1.1 Objectives 108 14.1.2 Component levelling . 108 14.1.3 Application notes 108 14.1.4 ATE_COV.1 Evidence of coverage 108 14.1.5 ATE_COV.2 Analysis of coverage . 109 14.1.6 ATE_COV.3 Rigorous analysis of c

47、overage . 109 14.2 Depth (ATE_DPT) . 110 14.2.1 Objectives 110 14.2.2 Component levelling . 111 14.2.3 Application notes 111 14.2.4 ATE_DPT.1 Testing: basic design . 111 14.2.5 ATE_DPT.2 Testing: security enforcing modules 112 14.2.6 ATE_DPT.3 Testing: modular design 112 14.2.7 ATE_DPT.4 Testing: im

48、plementation representation 113 14.3 Functional tests (ATE_FUN) . 114 14.3.1 Objectives 114 14.3.2 Component levelling . 114 14.3.3 Application notes 114 14.3.4 ATE_FUN.1 Functional testing . 115 14.3.5 ATE_FUN.2 Ordered functional testing . 115 14.4 Independent testing (ATE_IND) . 116 14.4.1 Object

49、ives 116 14.4.2 Component levelling . 116 14.4.3 Application notes 117 14.4.4 ATE_IND.1 Independent testing - conformance . 117 14.4.5 ATE_IND.2 Independent testing - sample . 118 14.4.6 ATE_IND.3 Independent testing - complete 119 15 Class AVA: Vulnerability assessment . 120 15.1 Application notes 120 15.2 Vulnerability analysis (AVA_VAN) . 121 15.2.1 Objectives 121 15.2.2 Component levelling . 121 15.2.3 AVA_VAN.1 Vulnerability survey . 121 15.2.4 AVA_VAN.2 Vulnerability

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1