Information technology - Security techniques - Methodology for IT security evaluation (ISO/IEC 18045:2008)

EN-ISO/IEC 18045 is a companion document to the “Evaluation criteria for IT security”, ISO/IEC 15408. This International Standard defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 evaluation, using the criteria and evaluation evidence defined in ISO/IEC 15408. This International Standard does not define evaluator actions for certain high assurance ISO/IEC 15408 components, where there is as yet no generally agreed guidance.

Informationstechnik - Sicherheitstechniken - Methodik für die Bewertung der IT-Sicherheit (ISO/IEC 18045:2008)

Diese Internationale Norm ist ein Begleitdokument zu den „Evaluierungskriterien für die IT-Sicherheit“, ISO/IEC 15408. Diese Internationale Norm legt die Aktionen fest, die ein Evaluator mindestens durchführen muss, um eine Evaluierung nach ISO/IEC 15408 unter Verwendung der in ISO/IEC 15408 definierten Kriterien und Evaluationsnachweise durchzuführen.
Diese Internationale Norm legt keine Evaluatorenaktionen für bestimmte Komponenten der ISO/IEC 15408 mit hoher Vertrauenswürdigkeit fest, für die es noch keine allgemein anerkannten Leitlinien gibt.

Technologies de l'information - Techniques de sécurité - Méthodologie pour l'évaluation de sécurité TI (ISO/IEC 18045:2008)

Informacijska tehnologija - Varnostne tehnike - Metodologija za varnostno vrednotenje IT (ISO/IEC 18045:2008)

General Information

Status
Published
Publication Date
17-Mar-2020
Current Stage
6060 - Definitive text made available (DAV) - Publishing
Due Date
18-Mar-2020
Completion Date
18-Mar-2020

Buy Standard

Standard
EN ISO/IEC 18045:2020
English language
302 pages
sale 10% off
Preview
sale 10% off
Preview

e-Library read for
1 day

Standards Content (sample)

SLOVENSKI STANDARD
SIST EN ISO/IEC 18045:2020
01-maj-2020
Informacijska tehnologija - Varnostne tehnike - Metodologija za varnostno
vrednotenje IT (ISO/IEC 18045:2008)

Information technology - Security techniques - Methodology for IT security evaluation

(ISO/IEC 18045:2008)
Informationstechnik - Sicherheitstechniken - Methodik für die Bewertung der IT-
Sicherheit (ISO/IEC 18045:2008)

Technologies de l'information - Techniques de sécurité - Méthodologie pour l'évaluation

de sécurité TI (ISO/IEC 18045:2008)
Ta slovenski standard je istoveten z: EN ISO/IEC 18045:2020
ICS:
35.030 Informacijska varnost IT Security
SIST EN ISO/IEC 18045:2020 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN ISO/IEC 18045:2020
---------------------- Page: 2 ----------------------
SIST EN ISO/IEC 18045:2020
EUROPEAN STANDARD
EN ISO/IEC 18045
NORME EUROPÉENNE
EUROPÄISCHE NORM
March 2020
ICS 35.030
English version
Information technology - Security techniques -
Methodology for IT security evaluation (ISO/IEC
18045:2008)

Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitstechniken - Methodik

- Méthodologie pour l'évaluation de sécurité TI für die Bewertung der IT-Sicherheit (ISO/IEC

(ISO/IEC 18045:2008) 18045:2008)
This European Standard was approved by CEN on 2 March 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for

giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical

references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to

any CEN and CENELEC member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by

translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC

Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,

Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,

Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,

Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.
CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels

© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 18045:2020 E

reserved worldwide for CEN national Members and for
CENELEC Members.
---------------------- Page: 3 ----------------------
SIST EN ISO/IEC 18045:2020
EN ISO/IEC 18045:2020 (E)
Contents Page

European foreword ....................................................................................................................................................... 3

---------------------- Page: 4 ----------------------
SIST EN ISO/IEC 18045:2020
EN ISO/IEC 18045:2020 (E)
European foreword

The text of ISO/IEC 18045:2008 has been prepared by Technical Committee ISO/IEC JTC 1 "Information

technology” of the International Organization for Standardization (ISO) and has been taken over as

EN ISO/IEC 18045:2020 by Technical Committee CEN/CLC/JTC 13 “Cybersecurity and Data Protection”

the secretariat of which is held by DIN.

This European Standard shall be given the status of a national standard, either by publication of an

identical text or by endorsement, at the latest by September 2020, and conflicting national standards

shall be withdrawn at the latest by September 2020.

Attention is drawn to the possibility that some of the elements of this document may be the subject of

patent rights. CEN shall not be held responsible for identifying any or all such patent rights.

According to the CEN-CENELEC Internal Regulations, the national standards organizations of the

following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,

Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,

Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of

North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the

United Kingdom.
Endorsement notice

The text of ISO/IEC 18045:2008 has been approved by CEN as EN ISO/IEC 18045:2020 without any

modification.
---------------------- Page: 5 ----------------------
SIST EN ISO/IEC 18045:2020
---------------------- Page: 6 ----------------------
SIST EN ISO/IEC 18045:2020
INTERNATIONAL ISO/IEC
STANDARD 18045
Second edition
2008-08-15
Corrected version
2014-01-15
Information technology — Security
techniques — Methodology for IT security
evaluation
Technologies de l'information — Techniques de sécurité —
Méthodologie pour l'évaluation de sécurité TI
Reference number
ISO/IEC 18045:2008(E)
ISO/IEC 2008
---------------------- Page: 7 ----------------------
SIST EN ISO/IEC 18045:2020
ISO/IEC 18045:2008(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2008

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,

electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or

ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2008 – All rights reserved
---------------------- Page: 8 ----------------------
SIST EN ISO/IEC 18045:2020
ISO/IEC 18045:2008(E)
Contents Page

Foreword ........................................................................................................................................................... vii

Introduction ........................................................................................................................................................ ix

1 Scope ...................................................................................................................................................... 1

2 Normative references ............................................................................................................................ 1

3 Terms and definitions ........................................................................................................................... 1

4 Symbols and abbreviated terms .......................................................................................................... 3

5 Overview ................................................................................................................................................. 3

5.1 Organisation of this International Standard ....................................................................................... 3

6 Document Conventions ........................................................................................................................ 3

6.1 Terminology ........................................................................................................................................... 3

6.2 Verb usage ............................................................................................................................................. 3

6.3 General evaluation guidance ............................................................................................................... 4

6.4 Relationship between ISO/IEC 15408 and ISO/IEC 18045 structures ............................................... 4

7 Evaluation process and related tasks ................................................................................................. 5

7.1 Introduction ............................................................................................................................................ 5

7.2 Evaluation process overview ............................................................................................................... 5

7.2.1 Objectives .............................................................................................................................................. 5

7.2.2 Responsibilities of the roles ................................................................................................................ 5

7.2.3 Relationship of roles ............................................................................................................................. 6

7.2.4 General evaluation model ..................................................................................................................... 6

7.2.5 Evaluator verdicts ................................................................................................................................. 6

7.3 Evaluation input task ............................................................................................................................ 8

7.3.1 Objectives .............................................................................................................................................. 8

7.3.2 Application notes .................................................................................................................................. 8

7.3.3 Management of evaluation evidence sub-task ................................................................................... 8

7.4 Evaluation sub-activities ...................................................................................................................... 9

7.5 Evaluation output task .......................................................................................................................... 9

7.5.1 Objectives .............................................................................................................................................. 9

7.5.2 Management of evaluation outputs ..................................................................................................... 9

7.5.3 Application notes ................................................................................................................................ 10

7.5.4 Write OR sub-task ............................................................................................................................... 10

7.5.5 Write ETR sub-task .............................................................................................................................. 10

8 Class APE: Protection Profile evaluation ......................................................................................... 15

8.1 Introduction .......................................................................................................................................... 15

8.2 Application notes ................................................................................................................................ 16

8.2.1 Re-using the evaluation results of certified PPs .............................................................................. 16

8.3 PP introduction (APE_INT) ................................................................................................................. 16

8.3.1 Evaluation of sub-activity (APE_INT.1) ............................................................................................. 16

8.4 Conformance claims (APE_CCL) ....................................................................................................... 17

8.4.1 Evaluation of sub-activity (APE_CCL.1) ............................................................................................ 17

8.5 Security problem definition (APE_SPD) ............................................................................................ 24

8.5.1 Evaluation of sub-activity (APE_SPD.1) ............................................................................................ 24

8.6 Security objectives (APE_OBJ) ......................................................................................................... 25

8.6.1 Evaluation of sub-activity (APE_OBJ.1) ............................................................................................ 25

8.6.2 Evaluation of sub-activity (APE_OBJ.2) ............................................................................................ 25

8.7 Extended components definition (APE_ECD) .................................................................................. 28

8.7.1 Evaluation of sub-activity (APE_ECD.1) ........................................................................................... 28

8.8 Security requirements (APE_REQ) .................................................................................................... 31

© ISO/IEC 2008 – All rights reserved iii
---------------------- Page: 9 ----------------------
SIST EN ISO/IEC 18045:2020
ISO/IEC 18045:2008(E)

8.8.1 Evaluation of sub-activity (APE_REQ.1) .......................................................................................... 31

8.8.2 Evaluation of sub-activity (APE_REQ.2) .......................................................................................... 35

9 Class ASE: Security Target evaluation............................................................................................. 39

9.1 Introduction ......................................................................................................................................... 39

9.2 Application notes ................................................................................................................................ 39

9.2.1 Re-using the evaluation results of certified PPs ............................................................................. 39

9.3 ST introduction (ASE_INT) ................................................................................................................. 39

9.3.1 Evaluation of sub-activity (ASE_INT.1) ............................................................................................ 39

9.4 Conformance claims (ASE_CCL) ...................................................................................................... 42

9.4.1 Evaluation of sub-activity (ASE_CCL.1) ........................................................................................... 42

9.5 Security problem definition (ASE_SPD) ........................................................................................... 49

9.5.1 Evaluation of sub-activity (ASE_SPD.1) ........................................................................................... 49

9.6 Security objectives (ASE_OBJ) ......................................................................................................... 51

9.6.1 Evaluation of sub-activity (ASE_OBJ.1) ........................................................................................... 51

9.6.2 Evaluation of sub-activity (ASE_OBJ.2) ........................................................................................... 51

9.7 Extended components definition (ASE_ECD) ................................................................................. 53

9.7.1 Evaluation of sub-activity (ASE_ECD.1) ........................................................................................... 53

9.8 Security requirements (ASE_REQ) ................................................................................................... 57

9.8.1 Evaluation of sub-activity (ASE_REQ.1) .......................................................................................... 57

9.8.2 Evaluation of sub-activity (ASE_REQ.2) .......................................................................................... 60

9.9 TOE summary specification (ASE_TSS) .......................................................................................... 64

9.9.1 Evaluation of sub-activity (ASE_TSS.1) ........................................................................................... 64

9.9.2 Evaluation of sub-activity (ASE_TSS.2) ........................................................................................... 65

10 Class ADV: Development ................................................................................................................... 67

10.1 Introduction ......................................................................................................................................... 67

10.2 Application notes ................................................................................................................................ 67

10.3 Security Architecture (ADV_ARC) ..................................................................................................... 67

10.3.1 Evaluation of sub-activity (ADV_ARC.1) .......................................................................................... 67

10.4 Functional specification (ADV_FSP)................................................................................................. 72

10.4.1 Evaluation of sub-activity (ADV_FSP.1) ........................................................................................... 72

10.4.2 Evaluation of sub-activity (ADV_FSP.2) ........................................................................................... 75

10.4.3 Evaluation of sub-activity (ADV_FSP.3) ........................................................................................... 79

10.4.4 Evaluation of sub-activity (ADV_FSP.4) ........................................................................................... 84

10.4.5 Evaluation of sub-activity (ADV_FSP.5) ........................................................................................... 89

10.4.6 Evaluation of sub-activity (ADV_FSP.6) ........................................................................................... 94

10.5 Implementation representation (ADV_IMP) ...................................................................................... 95

10.5.1 Evaluation of sub-activity (ADV_IMP.1) ............................................................................................ 95

10.5.2 Evaluation of sub-activity (ADV_IMP.2) ............................................................................................ 97

10.6 TSF internals (ADV_INT) .................................................................................................................... 97

10.6.1 Evaluation of sub-activity (ADV_INT.1) ............................................................................................ 97

10.6.2 Evaluation of sub-activity (ADV_INT.2) ............................................................................................ 99

10.6.3 Evaluation of sub-activity (ADV_INT.3) .......................................................................................... 101

10.7 Security policy modelling (ADV_SPM) ........................................................................................... 101

10.7.1 Evaluation of sub-activity (ADV_SPM.1) ........................................................................................ 101

10.8 TOE design (ADV_TDS) .................................................................................................................... 101

10.8.1 Evaluation of sub-activity (ADV_TDS.1) ......................................................................................... 101

10.8.2 Evaluation of sub-activity (ADV_TDS.2) ......................................................................................... 105

10.8.3 Evaluation of sub-activity (ADV_TDS.3) ......................................................................................... 109

10.8.4 Evaluation of sub-activity (ADV_TDS.4) ......................................................................................... 118

10.8.5 Evaluation of sub-activity (ADV_TDS.5) ......................................................................................... 126

10.8.6 Evaluation of sub-activity (ADV_TDS.6) ......................................................................................... 126

11 Class AGD: Guidance documents .................................................................................................. 127

11.1 Introduction ....................................................................................................................................... 127

11.2 Application notes .............................................................................................................................. 127

11.3 Operational user guidance (AGD_OPE) ......................................................................................... 127

11.3.1 Evaluation of sub-activity (AGD_OPE.1) ........................................................................................ 127

11.4 Preparative procedures (AGD_PRE) ............................................................................................... 130

11.4.1 Evaluation of sub-activity (AGD_PRE.1) ........................................................................................ 130

iv © ISO/IEC 2008 – All rights reserved
---------------------- Page: 10 ----------------------
SIST EN ISO/IEC 18045:2020
ISO/IEC 18045:2008(E)

12 Class ALC: Life-cycle support ......................................................................................................... 131

12.1 Introduction ........................................................................................................................................ 131

12.2 CM capabilities (ALC_CMC) ............................................................................................................. 132

12.2.1 Evaluation of sub-activity (ALC_CMC.1) ......................................................................................... 132

12.2.2 Evaluation of sub-activity (ALC_CMC.2) ......................................................................................... 133

12.2.3 Evaluation of sub-activity (ALC_CMC.3) ......................................................................................... 135

12.2.4 Evaluation of sub-activity (ALC_CMC.4) ......................................................................................... 138

12.2.5 Evaluation of sub-activity (ALC_CMC.5) ......................................................................................... 143

12.3 CM scope (ALC_CMS) ....................................................................................................................... 150

12.3.1 Evaluation of sub-activity (ALC_CMS.1) ......................................................................................... 150

12.3.2 Evaluation of sub-activity (ALC_CMS.2) ......................................................................................... 151

12.3.3 Evaluation of sub-activity (ALC_CMS.3) ......................................................................................... 152

12.3.4 Evaluation of sub-activity (ALC_CMS.4) ......................................................................................... 153

12.3.5 Evaluation of sub-activity (ALC_CMS.5) ......................................................................................... 154

12.4 Delivery (ALC_DEL) ........................................................................................................................... 155

12.4.1 Evaluation of sub-activity (ALC_DEL.1) .......................................................................................... 155

12.5 Development security (ALC_DVS) ................................................................................................... 156

12.5.1 Evaluation of sub-activity (ALC_DVS.1) .......................................................................................... 156

12.5.2 Evaluation of sub-activity (ALC_DVS.2) .......................................................................................... 158

12.6 Flaw remediation (ALC_FLR) ........................................................................................................... 161

12.6.1 Evaluation of sub-activity (ALC_FLR.1) .......................................................................................... 161

12.6.2 Evaluation of sub-activity (ALC_FLR.2) .......................................................................................... 163

12.6.3 Evaluation of sub-activity (ALC_FLR.3) .......................................................................................... 167

12.7 Life-cycle definition (ALC_LCD) ...................................................................................................... 171

12.7.1 Evaluation of sub-activity (ALC_LCD.1) .......................................................................................... 171

12.7.2 Evaluation of sub-activity (ALC_LCD.2) .......................................................................................... 172

12.8 Tools and techniques (ALC_TAT) .................................................................................................... 174

12.8.1 Evaluation of sub-activity (ALC_TAT.1) .......................................................................................... 174

12.8.2 Evaluation of sub-activity (ALC_TAT.2) .......................................................................................... 176

12.8.3 Evaluation of sub-activity (ALC_TAT.3) .......................................................................................... 178

13 Class ATE: Tests ............................................................................................................................... 181

13.1 Introduction ........................................................................................................................................ 181

13.2 Application notes .............................................................................................................................. 181

13.2.1 Understanding the expected behaviour of the TOE ...................................................................... 181

13.2.2 Testing vs. alternate approaches to verify the expected behaviour of functionality ................. 182

13.2.3 Verifying the adequacy of tests ....................................................................................................... 182

13.3 Coverage (ATE_COV) ........................................................................................................................ 183

13.3.1 Evaluation of sub-activity (ATE_COV.1) ......................................................................................... 183

13.3.2 Evaluation of sub-activity (ATE_COV.2) ......................................................................................... 183

13.3.3 Evaluation of sub-activity (ATE_COV.3) ......................................................................................... 184

13.4 Depth (ATE_DPT) ............................................................................................................................... 185

13.4.1 Evaluation of sub-activity (ATE_DPT.1) .......................................................................................... 185

13.4.2 Evaluation of sub-activity (ATE_DPT.2) .......................................................................................... 187

13.4.3 Evaluation of sub-activity (ATE_DPT.3) .......................................................................................... 189

13.4.4 Evaluation of sub-activity (ATE_DPT.4) .......................................................................................... 192

13.5 Functional tests (ATE_FUN) ............................................................................................................. 192

13.5.1 Evaluation of sub-activity (ATE_FUN.1) .......................................................................................... 192

13.5.2 Evaluation of sub-activity (ATE_FUN.2) .......................................................................................... 195

13.6 Independent testing (ATE_IND) ....................................................................................................... 195

13.6.1 Evaluation of sub-activity (ATE_IND.1) ........................................................................................... 195

13.6.2 Evaluation of sub-activity (ATE_IND.2) ........................................................................................... 198

13.6.3 Evaluation of sub-activity (ATE_IND.3) ........................................................................................... 203

14 Class AVA: Vulnerability assessment ............................................................................................. 203

14.1 Introduction ........................................................................................................................................ 203

14.2 Vulnerability analysis (AVA_VAN) ................................................................................................... 204

14.2.1 Evaluation of sub-activity (AVA_VAN.1) ......................................................................................... 204

14.2.2 Evaluation of sub-activity (AVA
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.