UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close

This is embarrasing..

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing..

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC TR 15446

Information technology - Security techniques - Guidance for the production of protection profiles and security targets

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 October 2017
Status: active
Page Count: 86
ICS Code (IT Security): 35.030
scope:

This document provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408 (all parts). It is also applicable to PPs and STs compliant with Common Criteria Version 3.1 Revision 4[6], a technically identical standard published by the Common Criteria Management Board, a consortium of governmental organizations involved in IT security evaluation and certification.

NOTE This document is not intended as an introduction to evaluation using ISO/IEC 15408 (all parts). Readers who seek such an introduction can read ISO/IEC 15408-1.

This document does not deal with associated tasks beyond PP and ST specification such as PP registration and the handling of protected intellectual property.

Document History

ISO/IEC TR 15446
October 1, 2017
Information technology - Security techniques - Guidance for the production of protection profiles and security targets
This document provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408 (all...
March 1, 2009
Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
This Technical Report provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408....
July 1, 2004
Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
A description is not available for this item.

References

Advertisement