SANS 15446-2009 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets《信息技术 安全技术 保障轮廓和安全目标用指南》.pdf
《SANS 15446-2009 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets《信息技术 安全技术 保障轮廓和安全目标用指南》.pdf》由会员分享,可在线阅读,更多相关《SANS 15446-2009 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets《信息技术 安全技术 保障轮廓和安全目标用指南》.pdf(94页珍藏版)》请在麦多课文档分享上搜索。
1、 Collection of SANS standards in electronic format (PDF) 1. Copyright This standard is available to staff members of companies that have subscribed to the complete collection of SANS standards in accordance with a formal copyright agreement. This document may reside on a CENTRAL FILE SERVER or INTRA
2、NET SYSTEM only. Unless specific permission has been granted, this document MAY NOT be sent or given to staff members from other companies or organizations. Doing so would constitute a VIOLATION of SABS copyright rules. 2. Indemnity The South African Bureau of Standards accepts no liability for any
3、damage whatsoever than may result from the use of this material or the information contain therein, irrespective of the cause and quantum thereof. ISBN 978-0-626-23168-2 SANS 15446:2009 Edition 2 ISO/IEC TR 15446:2009 Edition 2 SOUTH AFRICAN NATIONAL STANDARD Information technology Security techniqu
4、es Guide for the production of Protection Profiles and Security Targets This national standard is the identical implementation of ISO/IEC TR 15446:2009 and is adopted with the permission of the International Electrotechnical Commission. Published by SABS Standards Division 1 Dr Lategan Road Groenklo
5、of envelopeback Private Bag X191 Pretoria 0001 Tel: +27 12 428 7911 Fax: +27 12 344 1568 www.sabs.co.za SABS SANS 15446:2009 Edition 2 ISO/IEC TR 15446:2009 Edition 2 Table of changes Change No. Date Scope National foreword This South African standard was approved by National Committee SABS SC 71F,
6、Information technology Information security, in accordance with procedures of the SABS Standards Division, in compliance with annex 3 of the WTO/TBT agreement. This SANS document was published in December 2009. This SANS document supersedes SANS 15446:2005 (edition 1). Reference numberISO/IEC TR 154
7、46:2009(E)ISO/IEC 2009TECHNICAL REPORT ISO/IECTR15446Second edition2009-03-01Information technology Security techniques Guide for the production of Protection Profiles and Security Targets Technologies de linformation Techniques de scurit Guide pour la production de profils de protection et de cible
8、s de scurit SANS 15446:2009This s tandard may only be used and printed by approved subscription and freemailing clients of the SABS .ISO/IEC TR 15446:2009(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed bu
9、t shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this
10、area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for us
11、e by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2009 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized
12、 in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41
13、 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2009 All rights reservedSANS 15446:2009This s tandard may only be used and printed by approved subscription and freemailing clients of the SABS . ISO 2009 All rights reserved iiiContents Page Foreword .vii Intr
14、oductionviii 1 Scope1 2 Normative references1 3 Terms and definitions .1 4 Abbreviations.1 5 Purpose and structure of this technical report 2 6 An overview of PPs and STs 3 6.1 Introduction3 6.2 Audience 3 6.3 The use of PPs and STs3 6.3.1 Introduction3 6.3.2 Specification-based purchasing processes
15、 .4 6.3.3 Selection-based purchasing processes7 6.3.4 Other uses of PPs8 6.4 The PP/ST development process.9 6.5 Reading and understanding PPs and STs9 6.5.1 Introduction9 6.5.2 Reading the TOE overview .10 6.5.3 Reading the TOE description .11 6.5.4 Security objectives for the operational environme
16、nt 12 6.5.5 Reading the conformance claim12 6.5.6 Conformance to Protection Profiles13 ISO/IEC TR 15446:2009(E) SANS 15446:2009This s tandard may only be used and printed by approved subscription and freemailing clients of the SABS .iv ISO 2009 All rights reserved6.5.7 EALs and other assurance issue
17、s .13 6.5.8 Summary.14 6.5.9 Further reading 15 7 Specifying the PP/ST introduction.15 8 Specifying conformance claims.15 9 Specifying the security problem definition.16 9.1 Introduction16 9.2 Identifying the informal security requirement 18 9.2.1 Introduction18 9.2.2 Sources of information .18 9.2.
18、3 Documenting the informal requirement 20 9.3 How to identify and specify threats .21 9.3.1 Introduction21 9.3.2 Deciding on a threat analysis methodology .21 9.3.3 Identifying participants .22 9.3.4 Applying the chosen threat analysis methodology .26 9.3.5 Practical advice27 9.4 How to identify and
19、 specify policies28 9.5 How to identify and specify assumptions.29 9.6 Finalising the security problem definition 31 10 Specifying the security objectives.32 10.1 Introduction32 10.2 Structuring the threats, policies and assumptions34 10.3 Identifying the non-IT operational environment objectives 34
20、 10.4 Identifying the IT operational environment objectives 35 10.5 Identifying the TOE objectives .36 10.6 Producing the objectives rationale39 ISO/IEC TR 15446:2009(E) SANS 15446:2009This s tandard may only be used and printed by approved subscription and freemailing clients of the SABS . ISO 2009
21、 All rights reserved v11 Specifying extended component definitions40 12 Specifying the security requirements .43 12.1 Introduction43 12.2 The security paradigms in ISO/IEC 15408 45 12.2.1 Explanation of the security paradigms and their usage for modelling the security functionality .45 12.2.2 Contro
22、lling access to and use of resources and objects .45 12.2.3 User management .49 12.2.4 TOE self protection .50 12.2.5 Securing communication .51 12.2.6 Security audit.52 12.2.7 Architectural requirements 53 12.3 How to specify security functional requirements in a PP or ST.54 12.3.1 How should secur
23、ity functional requirements be selected? 54 12.3.2 Selecting SFRs from ISO/IEC 15408-2.57 12.3.3 How to perform operations on security functional requirements59 12.3.4 How should the audit requirements be specified?61 12.3.5 How should management requirements be specified?.62 12.3.6 How should SFRs
24、taken from a PP be specified? .63 12.3.7 How should SFRs not in a PP be specified? 63 12.3.8 How should SFRs not included in Part 2 of ISO/IEC 15408 be specified? 64 12.3.9 How should the SFRs be presented?64 12.3.10 How to develop the security requirements rationale.65 12.4 How to specify assurance
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- SANS154462009INFORMATIONTECHNOLOGYSECURITYTECHNIQUESGUIDEFORTHEPRODUCTIONOFPROTECTIONPROFILESANDSECURITYTARGETS

链接地址:http://www.mydoc123.com/p-1029456.html