UNLIMITED FREE
ACCESS
TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

- Trained on our vast library of engineering resources.

ISO/IEC TR 15443-2

Information technology - Security techniques - Security assurance framework Part 2: Analysis

active, Most Current
Buy Now
Organization: ISO
Publication Date: 15 November 2012
Status: active
Page Count: 26
ICS Code (Information coding): 35.040
scope:

This part of ISO/IEC TR 15443 builds on the concepts presented in ISO/IEC TR 15443-1. It provides a discussion of the attributes of security assurance conformity assessment methods that contribute towards making assurance claims and providing assurance evidence to fulfil meeting the assurance requirements for a deliverable.

This part of ISO/IEC TR 15443 proposes criteria for comparing and analysing different SACA methods. The reader is cautioned that the methods used as examples in this part of ISO/IEC TR 15443 are considered to represent popularly used methods at the time of its writing. New methods may appear, and modification or withdrawal of the methods cited may occur. It is intended that the criteria can be used to describe and compare any SACA method whatever its provenance.

Document History

ISO/IEC TR 15443-2
November 15, 2012
Information technology - Security techniques - Security assurance framework Part 2: Analysis
This part of ISO/IEC TR 15443 builds on the concepts presented in ISO/IEC TR 15443-1. It provides a discussion of the attributes of security assurance conformity assessment methods that contribute...
September 1, 2005
Information technology - Security techniques - A framework for IT security assurance - Part 2: Assurance methods
A description is not available for this item.

References

Advertisement