UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close

This is embarrasing..

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing..

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC TR 15446

Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets

inactive
Buy Now
Organization: ISO
Publication Date: 1 March 2009
Status: inactive
Page Count: 90
ICS Code (Information coding): 35.040
scope:

This Technical Report provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408. It is also applicable to PPs and STs compliant with Common Criteria Version 3.1 [1], a technically identical standard published by the Common Criteria Management Board, a consortium of governmental organizations involved in IT security evaluation and certification.

This Technical Report is not intended as an introduction to evaluation using ISO/IEC 15408. Readers who seek such an introduction should read Part 1 of ISO/IEC 15408.

This Technical Report does not deal with associated tasks beyond PP and ST specifications such as PP registration and the handling of protected intellectual property.

Document History

October 1, 2017
Information technology - Security techniques - Guidance for the production of protection profiles and security targets
This document provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408 (all...
ISO/IEC TR 15446
March 1, 2009
Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
This Technical Report provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408....
July 1, 2004
Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
A description is not available for this item.

References

Advertisement