Information technology — Security techniques — Guidance for the production of protection profiles and security targets

ISO/IEC TR 15446 provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408 (all parts). It is also applicable to PPs and STs compliant with Common Criteria Version 3.1 Revision 4[6], a technically identical standard published by the Common Criteria Management Board, a consortium of governmental organizations involved in IT security evaluation and certification. NOTE ISO/IEC TR 15446 is not intended as an introduction to evaluation using ISO/IEC 15408 (all parts). Readers who seek such an introduction can read ISO/IEC 15408‑1. ISO/IEC TR 15446 does not deal with associated tasks beyond PP and ST specification such as PP registration and the handling of protected intellectual property.

Technologies de l'information — Techniques de sécurité — Guide pour la production de profils de protection et de cibles de sécurité

General Information

Status
Published
Publication Date
09-Oct-2017
Current Stage
6060 - International Standard published
Start Date
10-Oct-2017
Due Date
20-Apr-2018
Completion Date
20-Apr-2018
Ref Project

Relations

Technical report
ISO/IEC TR 15446:2017 - Information technology -- Security techniques -- Guidance for the production of protection profiles and security targets
English language
79 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


TECHNICAL ISO/IEC TR
REPORT 15446
Third edition
2017-10
Information technology — Security
techniques — Guidance for the
production of protection profiles and
security targets
Technologies de l'information — Techniques de sécurité — Guide
pour la production de profils de protection et de cibles de sécurité
Reference number
©
ISO/IEC 2017
© ISO/IEC 2017, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2017 – All rights reserved

Contents Page
Foreword .v
Introduction .vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 1
5 Purpose and structure of this document . 2
6 Overview of PPs and STs . 2
6.1 General . 2
6.2 Audience . 2
6.3 Use of PPs and STs . 3
6.3.1 General. 3
6.3.2 Specification-based purchasing processes . 4
6.3.3 Selection-based purchasing processes . 7
6.3.4 Other uses of PPs . 8
6.4 The PP/ST development process . 8
6.4.1 Including stakeholders in the development process . 8
6.4.2 Method to develop a PP or ST . 9
6.4.3 Evaluation of PPs and STs . 9
6.5 Reading and understanding PPs and STs .10
6.5.1 General.10
6.5.2 Reading the TOE overview .10
6.5.3 Reading the TOE description .11
6.5.4 Security objectives for the operational environment .12
6.5.5 Reading the conformance claim .12
6.5.6 Conformance to Protection Profiles .13
6.5.7 EALs and other assurance issues .13
6.5.8 Summary .15
6.5.9 Further reading .15
7 Specifying the PP/ST introduction .15
8 Specifying conformance claims .16
9 Specifying the security problem definition .17
9.1 General .17
9.2 Identifying the informal security requirement .18
9.2.1 General.18
9.2.2 Sources of information .19
9.2.3 Documenting the informal requirement .20
9.3 How to identify and specify threats .21
9.3.1 General.21
9.3.2 Deciding on a threat analysis methodology .21
9.3.3 Identifying participants .23
9.3.4 Applying the chosen threat analysis methodology .26
9.3.5 Practical advice .27
9.4 How to identify and specify policies .28
9.5 How to identify and specify assumptions .29
9.6 Finalizing the security problem definition .31
10 Specifying the security objectives .32
10.1 General .32
10.2 Structuring the threats, policies and assumptions .33
10.3 Identifying the non-IT operational environment objectives .34
© ISO/IEC 2017 – All rights reserved iii

10.4 Identifying the IT operational environment objectives .35
10.5 Identifying the TOE objectives .35
10.6 Producing the objectives rationale .38
11 Specifying extended component definitions .39
12 Specifying the security requirements .43
12.1 General .43
12.2 Security paradigms in ISO/IEC 15408 .45
12.2.1 Explanation of the security paradigms and their usage for modelling the
security functionality .45
12.2.2 Controlling access to and use of resources and objects .45
12.2.3 User management .48
12.2.4 TOE self protection .49
12.2.5 Securing communication .50
12.2.6 Security audit .52
12.2.7 Architectural requirements .52
12.3 How to specify security functional requirements in a PP or ST .53
12.3.1 How should security functional requirements be selected? .53
12.3.2 Selecting SFRs from ISO/IEC 15408-2:2008 .56
12.3.3 How to perform operations on security functional requirements .58
12.3.4 How should the audit requirements be specified? .60
12.3.5 How should management requirements be specified? .61
12.3.6 How should SFRs taken from a PP be specified? .62
12.3.7 How should SFRs not in a PP be specified? .62
12.3.8 How should SFRs not included in ISO/IEC 15408-2:2008 be specified? .62
12.3.9 How should the SFRs be presented? .63
12.3.10 How to develop the security requirements rationale .63
12.4 How to specify assurance requirements in a PP or ST .64
12.4.1 How should security assurance requirements be selected? .64
12.4.2 How to perform operations on security assurance requirements .65
12.4.3 How should SARs not included in ISO/IEC 15408-3:2008 be specified in a
PP or ST? .66
12.4.4 Security assurance requirements rationale .66
13 The
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.