Leave a comment

ISO/IEC TR refines the AVA_VAN assurance family activities defined in ISO/IEC and provides more specific guidance on the identification. evaluators that use ISO/IEC and ISO/IEC for a security evaluation. This document is intended to be fully consistent with ISO/IEC ; however. Title: ISO/IEC – Information technology — Security techniques — Methodology for IT security evaluation. Source reference: livelink.

Author: Tolabar Zur
Country: Kuwait
Language: English (Spanish)
Genre: Education
Published (Last): 16 April 2018
Pages: 74
PDF File Size: 5.44 Mb
ePub File Size: 18.78 Mb
ISBN: 645-8-45039-233-9
Downloads: 71945
Price: Free* [*Free Regsitration Required]
Uploader: Virg

ISO/IEC 18045:2008

This service recognises that as changes are made to a certified TOE or its environment, evaluation work previously performed need kso to be repeated in all circumstances. This service provides customers with specific Malaysia national security requirements confidence that CC certified ICT products from other schemes meet these requirements.

Write a product review. This can be done by writing an implementation-independent structure document call a Protection Profile PP. Maintenance of assurance provides customers with a cost effective method of maintaining the same assurance level for a certified TOE after modification and update throughout its normal lifecycle.

This approach will minimise the redundancy in the security evaluation. Delivery and Returns see our delivery rates and policies thinking of returning an item?

GSO ISO/IEC – Standards Store – GCC Standardization Organization

Shopbop Designer Fashion Brands. Would you like to tell us about a lower price? Share your thoughts with other customers. Amazon Prime Music Stream millions of songs, ad-free. Cashback will be credited as Amazon Pay balance within 10 days. Furthermore, it will also prove that the TOE meets its security requirements at a defined level of assurance. Your basket is empty. Find Similar Items This product falls into the following categories.


Worldwide Standards We can source any standard from anywhere in the world. The faster, easier way to work with standards.

These properties are necessary for the PP to be suitable for use as the basis for writing a Security Target ST and guidance for the developers to develop a product or system that meet the consumers needs. Audible Download Audio Books.

This service provides customers confidence in the security functionality provided by a TOE.

Maintenance of assurance for security certified ICT products and systems Maintenance of assurance 188045 a voluntary process that leverages a certified TOE baseline as changes are made to the certified TOE. To support the delivery of certification and evaluation services, the MyCC Scheme deliver the following additional services:.

Enter your mobile number or email address below and we’ll send you a link to download the free Kindle App. If you are a seller for this product, would you like to suggest updates through seller support? This website is best viewed with browser version of up to Microsoft Internet Explorer 8 or Firefox 3.


Maintenance of assurance is a voluntary process that leverages a certified TOE baseline as changes are made to the certified TOE. This service provides customers with validated security requirements to support selection and procurement of ICT lec. Learn more about the cookies we use and how to change your settings.

You may experience issues viewing this site in Internet Explorer 9, 10 or Evaluating a PP is required to demonstrate that the PP is sound and internally consistent. See kso Returns Policy.

Cashback within 3 days from shipment. Get to Know Us. Security evaluation and certification of CC Protection Profiles The Common Criteria allow consumer, especially in consumer groups and communities of interest, to express their security needs for a type of product uso an unambiguous manner.

Supporting Services To ie the delivery of certification and evaluation services, the MyCC Scheme deliver the following additional services: We use cookies to make our website easier to isso and to better understand your needs. I’d like to read this book on Kindle Don’t have a Kindle? Then you can start reading Kindle books on your smartphone, tablet, or computer – no Kindle device required.