ETSI ES 202 382-2005 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Security Design Guide Method and proforma for defining Protec_1.pdf
《ETSI ES 202 382-2005 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Security Design Guide Method and proforma for defining Protec_1.pdf》由会员分享,可在线阅读,更多相关《ETSI ES 202 382-2005 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Security Design Guide Method and proforma for defining Protec_1.pdf(20页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI ES 202 382 V1.1.1 (2005-04)ETSI Standard Telecommunications and Internet converged Services andProtocols for Advanced Networking (TISPAN);Security Design Guide;Method and proforma for defining Protection ProfilesETSI ETSI ES 202 382 V1.1.1 (2005-04) 2 Reference DES/TISPAN-07009-Tech Keywords I
2、P, methodology, profile, protection, security, VoIP ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important no
3、tice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portab
4、le Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information
5、on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may
6、be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2005. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of i
7、ts Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI ES 202 382 V1.1.1 (2005-04) 3 Contents Intellectual P
8、roperty Rights4 Foreword.4 Introduction 4 1 Scope 5 2 References 5 3 Definitions and abbreviations.6 3.1 Definitions6 3.2 Abbreviations .6 4 Overview 6 4.1 Common Criteria concepts.6 4.2 Relationship between a standard and a PP .6 5 PP development7 5.1 Elements of a Protection Profile.7 5.1.1 PP Int
9、roduction .8 5.1.1.1 PP identification8 5.1.1.2 PP overview 8 5.1.2 Target Of Evaluation description8 5.1.3 TOE security environment9 5.1.4 Security objectives10 5.1.5 IT security requirements .11 5.1.5.1 The relationship between security objectives and security requirements11 5.1.5.2 TOE Security r
10、equirements.11 5.1.6 Application notes (OPTIONAL).12 5.1.7 Rationale.12 Annex A (normative): Protection Profile definition proforma 13 Annex B (informative): Example Protection Profile .15 Annex C (informative): Bibliography.19 History 20 ETSI ETSI ES 202 382 V1.1.1 (2005-04) 4 Intellectual Property
11、 Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essen
12、tial, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has
13、been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This ETSI Standard (ES) has been produced by ETSI Technical
14、 Committee Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN). Introduction The present document has been prepared with the sponsorship of the eEurope programme as part of the ETSI support to the eEurope action line for a secure information infrastructu
15、re (item 3: Society). A major part of any security specification, and of a security product, is the measure of assurance it provides with respect to the security it offers. Information security evaluation contributes to the users trust and confidence in communications products and services. The use
16、of common criteria for evaluation (as defined in ISO/IEC 15408 7) has facilitated mutual recognition of results in many European countries and these countries have also entered into an arrangement with the US and Canada for further mutual recognition of IT security certificates. The present document
17、 is part of a set of standards and guidelines which show how the Common Criteria as identified in ISO/IEC 15408 7 can be used effectively within the ETSI standardization process. The documents in this set are: EG 202 387 1: Method for application of Common Criteria to ETSI deliverables; ES 202 382:
18、Method and proforma for defining Protection Profiles; ES 202 383 2: Method and proforma for defining Security Targets. Between them, these documents identify how standards fit to the Common Criteria and how developers of standards should prepare their standards with a view to support submission for
19、evaluation of product conforming to the standards. Adoption of Common Criteria objectives in standardization of security countermeasures is also consistent with achieving the objectives and recommendations of the NIS report. ETSI ETSI ES 202 382 V1.1.1 (2005-04) 5 1 Scope The present document provid
20、es guidance on the preparation of Protection Profiles (PP) based upon ETSI communication standards. A PP defines an implementation-independent set of security requirements for a category of communications equipment which is subject to evaluation under the Common Criteria (CC) scheme described in the
21、 multipart ISO/IEC 15408 7.The detailed contents of a PP are specified in ISO/IEC 15408-1 4. The use and applicability of the CC to the ETSI standardization process is described in EG 202 387 1 and further guidance on the implementation of security-related standards in telecommunications equipment i
22、s specified in ES 202 383 2. Throughout the present document, a worked example of a Protection Profile (PP) for TETRA Direct Mode Operation (DMO) security is used as an illustration. A partially complete PP for TETRA DMO security can be found in annex B. NOTE: TETRA DMO was chosen as the example in
23、the present document as, although the security analysis results, objectives and requirements are not necessarily collected together in one document, most of this information exists either explicitly or implicitly and it was, therefore, possible to construct a realistic and representative example PP.
24、 Conformance to the present document is established by successful evaluation to the requirements of ISO/IEC 15408-3 6. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identif
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIES2023822005TELECOMMUNICATIONSANDINTERNETCONVERGEDSERVICESANDPROTOCOLSFORADVANCEDNETWORKINGTISPANSECURITYDESIGNGUIDEMETHODANDPROFORMAFORDEFININGPROTEC_1PDF

链接地址:http://www.mydoc123.com/p-730929.html