Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2008)

EN-ISO/IEC 15408-2 defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common security functionality requirements of many IT products.

Informationstechnik - IT-Sicherheitsverfahren - Evaluationskriterien für IT-Sicherheit - Teil 2: Sicherheitsfunktionskomponenten (ISO/IEC 15408-2:2008)

Technologies de l'information - Techniques de sécurité - Critères d'évaluation pour la sécurité TI - Partie 2: Composants fonctionnels de sécurité (ISO/IEC 15408-2:2008)

Informacijska tehnologija - Varnostne tehnike - Merila za vrednotenje varnosti IT - 2. del: Funkcionalne varnostne komponente (ISO/IEC 15408-2:2008)

General Information

Status
Published
Publication Date
17-Mar-2020
Current Stage
6060 - Definitive text made available (DAV) - Publishing
Due Date
18-Mar-2020
Completion Date
18-Mar-2020

Buy Standard

Standard
EN ISO/IEC 15408-2:2020
English language
241 pages
sale 10% off
Preview
sale 10% off
Preview

e-Library read for
1 day

Standards Content (sample)

SLOVENSKI STANDARD
SIST EN ISO/IEC 15408-2:2020
01-maj-2020

Informacijska tehnologija - Varnostne tehnike - Merila za vrednotenje varnosti IT -

2. del: Funkcionalne varnostne komponente (ISO/IEC 15408-2:2008)

Information technology - Security techniques - Evaluation criteria for IT security - Part 2:

Security functional components (ISO/IEC 15408-2:2008)

Informationstechnik - Sicherheitstechniken - Bewertungskriterien für die IT-Sicherheit -

Teil 2: Sicherheitsfunktionskomponenten (ISO/IEC 15408-2:2008)

Technologies de l'information - Techniques de sécurité - Critères d'évaluation pour la

sécurité TI - Partie 2: Composants fonctionnels de sécurité (ISO/IEC 15408-2:2008)

Ta slovenski standard je istoveten z: EN ISO/IEC 15408-2:2020
ICS:
35.030 Informacijska varnost IT Security
SIST EN ISO/IEC 15408-2:2020 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN ISO/IEC 15408-2:2020
---------------------- Page: 2 ----------------------
SIST EN ISO/IEC 15408-2:2020
EUROPEAN STANDARD
EN ISO/IEC 15408-2
NORME EUROPÉENNE
EUROPÄISCHE NORM
March 2020
ICS 35.030
English version
Information technology - Security techniques - Evaluation
criteria for IT security - Part 2: Security functional
components (ISO/IEC 15408-2:2008)

Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitstechniken -

- Critères d'évaluation pour la sécurité TI - Partie 2: Bewertungskriterien für die IT-Sicherheit - Teil 2:

Composants fonctionnels de sécurité (ISO/IEC 15408- Sicherheitsfunktionskomponenten (ISO/IEC 15408-

2:2008) 2:2008)
This European Standard was approved by CEN on 2 March 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for

giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical

references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to

any CEN and CENELEC member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by

translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC

Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,

Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,

Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,

Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.
CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels

© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 15408-2:2020 E

reserved worldwide for CEN national Members and for
CENELEC Members.
---------------------- Page: 3 ----------------------
SIST EN ISO/IEC 15408-2:2020
EN ISO/IEC 15408-2:2020 (E)
Contents Page

European foreword ....................................................................................................................................................... 3

---------------------- Page: 4 ----------------------
SIST EN ISO/IEC 15408-2:2020
EN ISO/IEC 15408-2:2020 (E)
European foreword

The text of ISO/IEC 15408-2:2008 has been prepared by Technical Committee ISO/IEC JTC 1

"Information technology” of the International Organization for Standardization (ISO) and has been

taken over as EN ISO/IEC 15408-2:2020 by Technical Committee CEN/CLC/JTC 13 “Cybersecurity and

Data Protection” the secretariat of which is held by DIN.

This European Standard shall be given the status of a national standard, either by publication of an

identical text or by endorsement, at the latest by September 2020, and conflicting national standards

shall be withdrawn at the latest by September 2020.

Attention is drawn to the possibility that some of the elements of this document may be the subject of

patent rights. CEN shall not be held responsible for identifying any or all such patent rights.

According to the CEN-CENELEC Internal Regulations, the national standards organizations of the

following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,

Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,

Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of

North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the

United Kingdom.
Endorsement notice

The text of ISO/IEC 15408-2:2008 has been approved by CEN as EN ISO/IEC 15408-2:2020 without any

modification.
---------------------- Page: 5 ----------------------
SIST EN ISO/IEC 15408-2:2020
---------------------- Page: 6 ----------------------
SIST EN ISO/IEC 15408-2:2020
INTERNATIONAL ISO/IEC
STANDARD 15408-2
Third edition
2008-08-15
Corrected version
2011-06-01
Information technology — Security
techniques — Evaluation criteria for IT
security —
Part 2:
Security functional components
Technologies de l'information — Techniques de sécurité — Critères
d'évaluation pour la sécurité TI —
Partie 2: Composants fonctionnels de sécurité
Reference number
ISO/IEC 15408-2:2008(E)
ISO/IEC 2008
---------------------- Page: 7 ----------------------
SIST EN ISO/IEC 15408-2:2020
ISO/IEC 15408-2:2008(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2008

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,

electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or

ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2008 – All rights reserved
---------------------- Page: 8 ----------------------
SIST EN ISO/IEC 15408-2:2020
ISO/IEC 15408-2:2008(E)
Contents Page

Foreword ........................................................................................................................................................xviii

Introduction.......................................................................................................................................................xx

1 Scope......................................................................................................................................................1

2 Normative references............................................................................................................................1

3 Terms and definitions, symbols and abbreviated terms...................................................................1

4 Overview.................................................................................................................................................1

4.1 Organisation of this part of ISO/IEC 15408.........................................................................................1

5 Functional requirements paradigm .....................................................................................................2

6 Security functional components..........................................................................................................5

6.1 Overview.................................................................................................................................................5

6.1.1 Class structure......................................................................................................................................5

6.1.2 Family structure.....................................................................................................................................6

6.1.3 Component structure ............................................................................................................................8

6.2 Component catalogue...........................................................................................................................9

6.2.1 Component changes highlighting .....................................................................................................10

7 Class FAU: Security audit...................................................................................................................10

7.1 Security audit automatic response (FAU_ARP) ...............................................................................11

7.1.1 Family Behaviour.................................................................................................................................11

7.1.2 Component levelling ...........................................................................................................................11

7.1.3 Management of FAU_ARP.1 ...............................................................................................................11

7.1.4 Audit of FAU_ARP.1 ............................................................................................................................11

7.1.5 FAU_ARP.1 Security alarms...............................................................................................................11

7.2 Security audit data generation (FAU_GEN) ......................................................................................11

7.2.1 Family Behaviour.................................................................................................................................11

7.2.2 Component levelling ...........................................................................................................................11

7.2.3 Management of FAU_GEN.1, FAU_GEN.2.........................................................................................11

7.2.4 Audit of FAU_GEN.1, FAU_GEN.2 .....................................................................................................11

7.2.5 FAU_GEN.1 Audit data generation ....................................................................................................12

7.2.6 FAU_GEN.2 User identity association...............................................................................................12

7.3 Security audit analysis (FAU_SAA) ...................................................................................................12

7.3.1 Family Behaviour.................................................................................................................................12

7.3.2 Component levelling ...........................................................................................................................12

7.3.3 Management of FAU_SAA.1 ...............................................................................................................13

7.3.4 Management of FAU_SAA.2 ...............................................................................................................13

7.3.5 Management of FAU_SAA.3 ...............................................................................................................13

7.3.6 Management of FAU_SAA.4 ...............................................................................................................13

7.3.7 Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4..........................................................13

7.3.8 FAU_SAA.1 Potential violation analysis ...........................................................................................13

7.3.9 FAU_SAA.2 Profile based anomaly detection ..................................................................................14

7.3.10 FAU_SAA.3 Simple attack heuristics ................................................................................................14

7.3.11 FAU_SAA.4 Complex attack heuristics.............................................................................................15

7.4 Security audit review (FAU_SAR) ......................................................................................................15

7.4.1 Family Behaviour.................................................................................................................................15

7.4.2 Component levelling ...........................................................................................................................15

7.4.3 Management of FAU_SAR.1 ...............................................................................................................15

7.4.4 Management of FAU_SAR.2, FAU_SAR.3.........................................................................................15

7.4.5 Audit of FAU_SAR.1 ............................................................................................................................15

7.4.6 Audit of FAU_SAR.2 ............................................................................................................................16

7.4.7 Audit of FAU_SAR.3 ............................................................................................................................16

© ISO/IEC 2008 – All rights reserved iii
---------------------- Page: 9 ----------------------
SIST EN ISO/IEC 15408-2:2020
ISO/IEC 15408-2:2008(E)

7.4.8 FAU_SAR.1 Audit review....................................................................................................................16

7.4.9 FAU_SAR.2 Restricted audit review ..................................................................................................16

7.4.10 FAU_SAR.3 Selectable audit review ..................................................................................................16

7.5 Security audit event selection (FAU_SEL) ........................................................................................16

7.5.1 Family Behaviour.................................................................................................................................16

7.5.2 Component levelling ...........................................................................................................................17

7.5.3 Management of FAU_SEL.1 ................................................................................................................17

7.5.4 Audit of FAU_SEL.1.............................................................................................................................17

7.5.5 FAU_SEL.1 Selective audit.................................................................................................................17

7.6 Security audit event storage (FAU_STG) ..........................................................................................17

7.6.1 Family Behaviour.................................................................................................................................17

7.6.2 Component levelling ...........................................................................................................................17

7.6.3 Management of FAU_STG.1................................................................................................................18

7.6.4 Management of FAU_STG.2................................................................................................................18

7.6.5 Management of FAU_STG.3................................................................................................................18

7.6.6 Management of FAU_STG.4................................................................................................................18

7.6.7 Audit of FAU_STG.1, FAU_STG.2.......................................................................................................18

7.6.8 Audit of FAU_STG.3.............................................................................................................................18

7.6.9 Audit of FAU_STG.4.............................................................................................................................18

7.6.10 FAU_STG.1 Protected audit trail storage ..........................................................................................18

7.6.11 FAU_STG.2 Guarantees of audit data availability ............................................................................19

7.6.12 FAU_STG.3 Action in case of possible audit data loss ...................................................................19

7.6.13 FAU_STG.4 Prevention of audit data loss.........................................................................................19

8 Class FCO: Communication ...............................................................................................................20

8.1 Non-repudiation of origin (FCO_NRO)...............................................................................................20

8.1.1 Family Behaviour.................................................................................................................................20

8.1.2 Component levelling ...........................................................................................................................20

8.1.3 Management of FCO_NRO.1, FCO_NRO.2 ........................................................................................20

8.1.4 Audit of FCO_NRO.1............................................................................................................................20

8.1.5 Audit of FCO_NRO.2............................................................................................................................21

8.1.6 FCO_NRO.1 Selective proof of origin................................................................................................21

8.1.7 FCO_NRO.2 Enforced proof of origin................................................................................................21

8.2 Non-repudiation of receipt (FCO_NRR).............................................................................................22

8.2.1 Family Behaviour.................................................................................................................................22

8.2.2 Component levelling ...........................................................................................................................22

8.2.3 Management of FCO_NRR.1, FCO_NRR.2 ........................................................................................22

8.2.4 Audit of FCO_NRR.1............................................................................................................................22

8.2.5 Audit of FCO_NRR.2............................................................................................................................22

8.2.6 FCO_NRR.1 Selective proof of receipt ..............................................................................................22

8.2.7 FCO_NRR.2 Enforced proof of receipt ..............................................................................................23

9 Class FCS: Cryptographic support....................................................................................................24

9.1 Cryptographic key management (FCS_CKM)...................................................................................24

9.1.1 Family Behaviour.................................................................................................................................24

9.1.2 Component levelling ...........................................................................................................................24

9.1.3 Management of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4 ...........................................25

9.1.4 Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4 ........................................................25

9.1.5 FCS_CKM.1 Cryptographic key generation ......................................................................................25

9.1.6 FCS_CKM.2 Cryptographic key distribution.....................................................................................25

9.1.7 FCS_CKM.3 Cryptographic key access.............................................................................................25

9.1.8 FCS_CKM.4 Cryptographic key destruction .....................................................................................26

9.2 Cryptographic operation (FCS_COP) ................................................................................................26

9.2.1 Family Behaviour.................................................................................................................................26

9.2.2 Component levelling ...........................................................................................................................26

9.2.3 Management of FCS_COP.1 ...............................................................................................................26

9.2.4 Audit of FCS_COP.1 ............................................................................................................................26

9.2.5 FCS_COP.1 Cryptographic operation................................................................................................27

10 Class FDP: User data protection........................................................................................................27

10.1 Access control policy (FDP_ACC) .....................................................................................................29

iv © ISO/IEC 2008 – All rights reserved
---------------------- Page: 10 ----------------------
SIST EN ISO/IEC 15408-2:2020
ISO/IEC 15408-2:2008(E)

10.1.1 Family Behaviour.................................................................................................................................29

10.1.2 Component levelling ...........................................................................................................................30

10.1.3 Management of FDP_ACC.1, FDP_ACC.2.........................................................................................30

10.1.4 Audit of FDP_ACC.1, FDP_ACC.2......................................................................................................30

10.1.5 FDP_ACC.1 Subset access control ...................................................................................................30

10.1.6 FDP_ACC.2 Complete access control...............................................................................................30

10.2 Access control functions (FDP_ACF) ...............................................................................................30

10.2.1 Family Behaviour.................................................................................................................................30

10.2.2 Component levelling ...........................................................................................................................30

10.2.3 Management of FDP_ACF.1 ...............................................................................................................31

10.2.4 Audit of FDP_ACF.1 ............................................................................................................................31

10.2.5 FDP_ACF.1 Security attribute based access control ......................................................................31

10.3 Data authentication (FDP_DAU).........................................................................................................32

10.3.1 Family Behaviour.................................................................................................................................32

10.3.2 Component levelling ...........................................................................................................................32

10.3.3 Management of FDP_DAU.1, FDP_DAU.2.........................................................................................32

10.3.4 Audit of FDP_DAU.1 ............................................................................................................................32

10.3.5 Audit of FDP_DAU.2 ............................................................................................................................32

10.3.6 FDP_DAU.1 Basic Data Authentication.............................................................................................32

10.3.7 FDP_DAU.2 Data Authentication with Identity of Guarantor ..........................................................33

10.4 Export from the TOE (FDP_ETC) .......................................................................................................33

10.4.1 Family Behaviour.................................................................................................................................33

10.4.2 Component levelling ...........................................................................................................................33

10.4.3 Management of FDP_ETC.1................................................................................................................33

10.4.4 Management of FDP_ETC.2................................................................................................................33

10.4.5 Audit of FDP_ETC.1, FDP_ETC.2 .......................................................................................................33

10.4.6 FDP_ETC.1 Export of user data without security attributes...........................................................34

10.4.7 FDP_ETC.2 Export of user data with security attributes.................................................................34

10.5 Information flow control policy (FDP_IFC) .......................................................................................34

10.5.1 Family Behaviour.................................................................................................................................34

10.5.2 Component levelling ...........................................................................................................................35

10.5.3 Management of FDP_IFC.1, FDP_IFC.2 .............................................................................................35

10.5.4 Audit of FDP_IFC.1, FDP_IFC.2..........................................................................................................35

10.5.5 FDP_IFC.1 Subset information flow control .....................................................................................35

10.5.6 FDP_IFC.2 Complete information flow control.................................................................................35

10.6 Information flow control functions (FDP_IFF)..................................................................................35

10.6.1 Family Behaviour.................................................................................................................................35

10.6.2 Component levelling ...........................................................................................................................36

10.6.3 Management of FDP_IFF.1, FDP_IFF.2..............................................................................................36

10.6.4 Management of FDP_IFF.3, FDP_IFF.4, FDP_IFF.5 ..........................................................................36

10.6.5 Management of FDP_IFF.6..................................................................................................................36

10.6.6 Audit of FDP_IFF.1, FDP_IFF.2, FDP_IFF.5.......................................................................................36

10.6.7 Audit of FDP_IFF.3, FDP_IFF.4, FDP_IFF.6.......................................................................................37

10.6.8 FDP_IFF.1 Simple security attributes................................................................................................37

10.6.9 FDP_IFF.2 Hierarchical security attributes.......................................................................................37

10.6.10 FDP_IFF.3 Limited illicit information flows.......................................................................................38

10.6.11 FDP_IFF.4 Partial elimination of illicit information flows................................................................39

10.6.12 FDP_IFF.5 No illicit information flows...............................................................................................39

10.6.13 FDP_IFF.6 Illicit information flow monitoring...................................................................................39

10.7 Import from outside of the TOE (FDP_ITC).......................................................................................39

10.7.1 Family Behaviour.................................................................................................................................39

10.7.2 Component levelling ...........................................................................................................................39

10.7.3 Management of FDP_ITC.1, FDP_ITC.2......................................................................

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.