ETSI EG 202 387-2005 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Security Design Guide Method for application of Common Criter_1.pdf
《ETSI EG 202 387-2005 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Security Design Guide Method for application of Common Criter_1.pdf》由会员分享,可在线阅读,更多相关《ETSI EG 202 387-2005 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Security Design Guide Method for application of Common Criter_1.pdf(60页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI EG 202 387 V1.1.1 (2005-04)ETSI Guide Telecommunications and Internet converged Services andProtocols for Advanced Networking (TISPAN);Security Design Guide;Method for application ofCommon Criteria to ETSI deliverablesETSI ETSI EG 202 387 V1.1.1 (2005-04) 2 Reference DEG/TISPAN-07005-Tech Keyw
2、ords application, IP, methodology, security, VoIP ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important noti
3、ce Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable
4、 Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on
5、 the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be
6、 reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2005. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its
7、 Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI EG 202 387 V1.1.1 (2005-04) 3 Contents Intellectual Pro
8、perty Rights6 Foreword.6 Introduction 6 1 Scope 7 2 References 7 3 Definitions and abbreviations.8 3.1 Definitions8 3.2 Abbreviations .9 4 Security in standardization .9 4.1 Communications security model 9 4.2 Standards review and evaluation10 4.3 Overall development process .10 4.4 Protocol standar
9、ds containing security-related requirements .13 5 Overview of ISO/IEC 1540814 5.1 Introduction to the Common Criteria (CC) 14 5.1.1 Contents of a Protection Profile (PP)14 5.1.2 Contents of a Security Target (ST) .15 5.1.3 Common Criteria relationships.16 5.1.4 Evaluation Assurance Levels16 5.2 Over
10、view of CC documents .17 5.2.1 ISO/IEC 15408-1: Introduction and general model 17 5.2.2 ISO/IEC 15408-2: Security functional requirements17 5.2.3 ISO/IEC 15408-3: Security assurance requirements.17 5.3 ETSI standards in the evaluation of CC .17 6 Evaluation components in ISO/IEC-15408-3.17 6.1 Intro
11、duction 17 6.2 Configuration management 19 6.2.1 Class description.19 6.2.2 Implications for the standardization process.19 6.2.3 Families and components19 6.3 Delivery and operation .19 6.3.1 Class description.19 6.3.2 Implications for the standardization process.20 6.3.3 Families and components20
12、6.4 Development 20 6.4.1 Class description.20 6.4.2 Implications for the standardization process.21 6.4.3 Families and components22 6.4.3.1 Development class evaluation levels.22 6.4.3.2 Functional specification family (ADV_FSP) 23 6.4.3.2.1 Informal functional specification (ADV_FSP.1).23 6.4.3.2.2
13、 Fully defined external interfaces (ADV_FSP.2)24 6.4.3.2.3 Semiformal functional specification (ADV_FSP.3)24 6.4.3.2.4 Formal functional specification (ADV_FSP.4) .24 6.4.3.3 High-level design family (ADV_HLD) 24 6.4.3.3.1 Descriptive high-level design (ADV_HLD.1).24 6.4.3.3.2 Security enforcing hig
14、h-level design (ADV_HLD.2)25 6.4.3.3.3 Semiformal high-level design (ADV_HLD.3) 25 6.4.3.3.4 Semiformal high-level explanation (ADV_HLD.4) 26 6.4.3.3.5 Formal high-level design (ADV_HLD.5)27 6.4.3.4 Implementation representation family (ADV_IMP) .27 6.4.3.4.1 Subset of the implementation of the TSF
15、(ADV_IMP.1)27 ETSI ETSI EG 202 387 V1.1.1 (2005-04) 4 6.4.3.4.2 Implementation of the TSF (ADV_IMP.2) .27 6.4.3.4.3 Structured implementation of the TSF (ADV_IMP.3) 27 6.4.3.5 Standard internals family (ADV_INT)27 6.4.3.5.1 Modularity and layering (ADV_INT.1) 27 6.4.3.5.2 Reduction of complexity (AD
16、V_INT.2)28 6.4.3.5.3 Minimization of complexity (ADV_INT.3) 28 6.4.3.6 Low-level design family (ADV_LLD)28 6.4.3.6.1 Descriptive low-level design (ADV_LLD.1) 28 6.4.3.6.2 Semiformal low-level design (ADV_LLD.2)28 6.4.3.6.3 Formal low-level design (ADV_LLD.3) .28 6.4.3.7 Representation correspondence
17、 family (ADV_RCR) .28 6.4.3.7.1 Informal correspondence demonstration (ADV_RCR.1) 29 6.4.3.7.2 Semiformal correspondence demonstration (ADV_RCR.2) .29 6.4.3.7.3 Formal correspondence demonstration (ADV_RCR.3).29 6.4.3.8 Security policy modelling family (ADV_SPM)29 6.5 Guidance documents 29 6.5.1 Cla
18、ss description.29 6.5.2 Implications for the standardization process.29 6.5.3 Families and components30 6.5.3.1 Guidance documents class evaluation levels.30 6.5.3.2 Administrator guidance family (AGD_ADM) 30 6.5.3.3 User guidance family (AGD_USR) 30 6.6 Life cycle support.30 6.6.1 Class description
19、.30 6.6.2 Implications for the standardization process.31 6.6.3 Families and components31 6.6.3.1 Life cycle support class evaluation levels .31 6.6.3.2 Development security (ALC_DVS) 31 6.6.3.2.1 Family description.31 6.6.3.3 Flaw remediation (ALC_FLR)32 6.6.3.3.1 Family description.32 6.6.3.4 Life
20、 cycle definition (ALC_LCD).32 6.6.3.5 Tools and techniques (ALC_TAT) .32 6.6.3.5.1 Family description.32 6.7 Tests .33 6.7.1 Class description.33 6.7.2 Implications for the standardization process.33 6.7.3 Families and components33 6.7.3.1 Tests class evaluation levels33 6.7.3.2 Coverage family (AT
21、E_COV) 34 6.7.3.2.1 Evidence of coverage (ATE_COV.1)34 6.7.3.2.2 Analysis of coverage (ATE_COV.2).34 6.7.3.2.3 Rigorous analysis of coverage (ATE_COV.3) 35 6.7.3.3 Depth family (ATE_DPT).36 6.7.3.3.1 Testing: high-level design (ATE_DPT.1)36 6.7.3.3.2 Testing: low-level design (ATE_DPT.2).36 6.7.3.3.
22、3 Testing: implementation representation (APT_DPT.3).36 6.7.3.4 Functional tests family (ATE_FUN).37 6.7.3.4.1 Functional testing (ATE_FUN.1)37 6.7.3.4.2 Ordered functional testing (ATE_FUN.2).37 6.7.3.5 Independent testing (ATE_IND).38 6.7.3.5.1 Independent testing - conformance (ATE_IND.1) 38 6.7.
23、3.5.2 Independent testing - sample (ATE_IND.2)38 6.7.3.5.3 Independent testing - complete (ATE_IND.3) 38 6.8 Vulnerability assessment38 6.8.1 Class description.38 6.8.2 Implications for the standardization process.39 6.8.3 Families and components39 6.8.3.1 Vulnerability assessment class evaluation l
24、evels 39 6.8.3.2 Covert channel analysis family (AVA_CCA).39 6.8.3.2.1 Covert channel analysis.40 6.8.3.2.2 Systematic covert channel analysis .40 ETSI ETSI EG 202 387 V1.1.1 (2005-04) 5 6.8.3.2.3 Exhaustive covert channel analysis .40 6.8.3.3 Misuse family (AVA_MSU).40 6.8.3.3.1 Strength of TOE sec
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIEG2023872005TELECOMMUNICATIONSANDINTERNETCONVERGEDSERVICESANDPROTOCOLSFORADVANCEDNETWORKINGTISPANSECURITYDESIGNGUIDEMETHODFORAPPLICATIONOFCOMMONCRITER_1PDF

链接地址:http://www.mydoc123.com/p-727636.html