Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components

This document defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that meets the common security functionality requirements of many IT products.

Sécurité de l'information, cybersécurité et protection de la vie privée — Critères d'évaluation pour la sécurité des technologies de l'information — Partie 2: Composants fonctionnels de sécurité

General Information

Status
Published
Publication Date
08-Aug-2022
Current Stage
6060 - International Standard published
Due Date
15-Jun-2021
Completion Date
09-Aug-2022
Ref Project

RELATIONS

Buy Standard

Standard
ISO/IEC 15408-2:2022 - Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components Released:9. 08. 2022
English language
273 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (sample)

INTERNATIONAL ISO/IEC
STANDARD 15408-2
Fourth edition
2022-08
Information security, cybersecurity
and privacy protection — Evaluation
criteria for IT security —
Part 2:
Security functional components
Sécurité de l'information, cybersécurité et protection de la vie
privée — Critères d'évaluation pour la sécurité des technologies de
l'information —
Partie 2: Composants fonctionnels de sécurité
Reference number
ISO/IEC 15408-2:2022(E)
© ISO/IEC 2022
---------------------- Page: 1 ----------------------
ISO/IEC 15408-2:2022(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2022

All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may

be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on

the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below

or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC 15408-2:2022(E)
Contents Page

Foreword ...................................................................................................................................................................................................................................... xv

Introduction ......................................................................................................................................................................................................................... xvii

1 Scope ................................................................................................................................................................................................................................. 1

2 Normative references ..................................................................................................................................................................................... 1

3 Terms and definitions .................................................................................................................................................................................... 1

4 Abbreviated terms ............................................................................................................................................................................................. 3

5 Overview ....................................................................................................................................................................................................................... 4

5.1 General ........................................................................................................................................................................................................... 4

5.2 Organization of this document ........................................................................................................................................... ...... 4

6 Functional requirements paradigm ........................................................................................................................................... .....5

7 Security functional components .........................................................................................................................................................9

7.1 Overview ...................................................................................................................................................................................................... 9

7.1.1 General ........................................................................................................................................................................................ 9

7.1.2 Class structure ..................................................................................................................................................................... 9

7.1.3 Family structure .............................................................................................................................................................. 10

7.1.4 Component structure .................................................................................................................................................. 11

7.2 Component catalogue ....................................................................................................................................................................13

8 Class FAU: Security audit ..........................................................................................................................................................................14

8.1 Class description ................................................................................................................................................................................ 14

8.2 Security audit automatic response (FAU_ARP) ...................................................................................................... 15

8.2.1 Family behaviour ............................................................................................................................................................15

8.2.2 Components leveling and description .......................................................................................................... 15

8.2.3 Management of FAU_ARP.1 ..................................................................................................................................... 15

8.2.4 Audit of FAU_ARP.1 ........................................................................................................................................................ 15

8.2.5 FAU_ARP.1 Security alarms ................................................................................................................................... 15

8.3 Security audit data generation (FAU_GEN) ................................................................................................................ 15

8.3.1 Family behaviour ............................................................................................................................................................ 15

8.3.2 Components leveling and description .......................................................................................................... 15

8.3.3 Management of FAU_GEN.1, FAU_GEN.2 ..................................................................................................... 16

8.3.4 Audit of FAU_GEN.1, FAU_GEN.2......................................................................................................................... 16

8.3.5 FAU_GEN.1 Audit data generation .................................................................................................................... 16

8.3.6 FAU_GEN.2 User identity association ............................................................................................................ 16

8.4 Security audit analysis (FAU_SAA) .................................................................................................................................... 17

8.4.1 Family behaviour ............................................................................................................................................................ 17

8.4.2 Components leveling and description .......................................................................................................... 17

8.4.3 Management of FAU_SAA.1 .................................................................................................................................... 17

8.4.4 Management of FAU_SAA.2 .................................................................................................................................... 18

8.4.5 Management of FAU_SAA.3 .................................................................................................................................... 18

8.4.6 Management of FAU_SAA.4 .................................................................................................................................... 18

8.4.7 Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4 .......................................................... 18

8.4.8 FAU_SAA.1 Potential violation analysis ...................................................................................................... 18

8.4.9 FAU_SAA.2 Profile based anomaly detection ........................................................................................ 18

8.4.10 FAU_SAA.3 Simple attack heuristics .............................................................................................................. 19

8.4.11 FAU_SAA.4 Complex attack heuristics ......................................................................................................... 19

8.5 Security audit review (FAU_SAR) ....................................................................................................................................... 20

8.5.1 Family behaviour ............................................................................................................................................................20

8.5.2 Components leveling and description .......................................................................................................... 20

8.5.3 Management of FAU_SAR.1 .................................................................................................................................... 20

8.5.4 Management of FAU_SAR.2, FAU_SAR.3 ..................................................................................................... 20

8.5.5 Audit of FAU_SAR.1 ........................................................................................................................................... .............20

8.5.6 Audit of FAU_SAR.2 ....................................................................................................................................................... 21

iii
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 3 ----------------------
ISO/IEC 15408-2:2022(E)

8.5.7 Audit of FAU_SAR.3 ....................................................................................................................................................... 21

8.5.8 FAU_SAR.1 Audit review ........................................................................................................................................... 21

8.5.9 FAU_SAR.2 Restricted audit review ............................................................................................................... 21

8.5.10 FAU_SAR.3 Selectable audit review ................................................................................................................ 21

8.6 Security audit event selection (FAU_SEL) .................................................................................................................... 22

8.6.1 Family behaviour ............................................................................................................................................................22

8.6.2 Components leveling and description .......................................................................................................... 22

8.6.3 Management of FAU_SEL.1 ..................................................................................................................................... 22

8.6.4 Audit of FAU_SEL.1.........................................................................................................................................................22

8.6.5 FAU_SEL.1 Selective audit ....................................................................................................................................... 22

8.7 Security audit data storage (FAU_STG) ......................................................................................................................... 22

8.7.1 Family behaviour ............................................................................................................................................................22

8.7.2 Components leveling and description .......................................................................................................... 23

8.7.3 Management of FAU_STG.1 ..................................................................................................................................... 23

8.7.4 Management of FAU_STG.2 ..................................................................................................................................... 23

8.7.5 Management of FAU_STG.3 ..................................................................................................................................... 23

8.7.6 Management of FAU_STG.4 ..................................................................................................................................... 23

8.7.7 Management of FAU_STG.5 ..................................................................................................................................... 23

8.7.8 Audit of FAU_STG.1 ........................................................................................................................................................ 24

8.7.9 Audit of FAU_STG.2, FAU_STG.3 ......................................................................................................................... 24

8.7.10 Audit of FAU_STG.4 ........................................................................................................................................................ 24

8.7.11 Audit of FAU_STG.5 ........................................................................................................................................................ 24

8.7.12 FAU_STG.1 Audit data storage location ....................................................................................................... 24

8.7.13 FAU_STG.2 Protected audit data storage ................................................................................................... 24

8.7.14 FAU_STG.3 Guarantees of audit data availability ............................................................................... 25

8.7.15 FAU_STG.4 Action in case of possible audit data loss ..................................................................... 25

8.7.16 FAU_STG.5 Prevention of audit data loss ................................................................................................... 25

9 Class FCO: Communication .....................................................................................................................................................................25

9.1 Class description ................................................................................................................................................................................25

9.2 Non-repudiation of origin (FCO_NRO) ............................................................................................................................ 26

9.2.1 Family behaviour ............................................................................................................................................................26

9.2.2 Components leveling and description .......................................................................................................... 26

9.2.3 Management of FCO_NRO.1, FCO_NRO.2 .................................................................................................... 26

9.2.4 Audit of FCO_NRO.1 .......................................................................................................................................................26

9.2.5 Audit of FCO_NRO.2 ....................................................................................................................................................... 27

9.2.6 FCO_NRO.1 Selective proof of origin .............................................................................................................. 27

9.2.7 FCO_NRO.2 Enforced proof of origin ............................................................................................................. 27

9.3 Non-repudiation of receipt (FCO_NRR) .........................................................................................................................28

9.3.1 Family behaviour ............................................................................................................................................................28

9.3.2 Components leveling and description ..........................................................................................................28

9.3.3 Management of FCO_NRR.1, FCO_NRR.2 ...................................................................................................28

9.3.4 Audit of FCO_NRR.1.......................................................................................................................................................28

9.3.5 Audit of FCO_NRR.2 ......................................................................................................................................................28

9.3.6 FCO_NRR.1 Selective proof of receipt ...........................................................................................................29

9.3.7 FCO_NRR.2 Enforced proof of receipt ..........................................................................................................29

10 Class FCS: Cryptographic support ..................................................................................................................................................29

10.1 Class description ................................................................................................................................................................................29

10.2 Cryptographic key management (FCS_CKM) ...........................................................................................................30

10.2.1 Family behaviour ............................................................................................................................................................30

10.2.2 Components leveling and description ..........................................................................................................30

10.2.3 Management of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6 .................. 31

10.2.4 Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6 ..................................... 31

10.2.5 FCS_CKM.1 Cryptographic key generation .............................................................................................. 31

10.2.6 FCS_CKM.2 Cryptographic key distribution ........................................................................................... 32

10.2.7 FCS_CKM.3 Cryptographic key access ......................................................................................................... 32

10.2.8 FCS_CKM.4 Cryptographic key destruction ............................................................................................ 32

10.2.9 FCS_CKM.5 Cryptographic key derivation ............................................................................................... 33

© ISO/IEC 2022 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC 15408-2:2022(E)

10.2.10 FCS_CKM.6 Timing and event of cryptographic key destruction ........................................33

10.3 Cryptographic operation (FCS_COP) ............................................................................................................................... 33

10.3.1 Family behaviour ............................................................................................................................................................33

10.3.2 Components leveling and description .......................................................................................................... 33

10.3.3 Management of FCS_COP.1 ......................................................................................................................................34

10.3.4 Audit of FCS_COP.1 .........................................................................................................................................................34

10.3.5 FCS_COP.1 Cryptographic operation ..............................................................................................................34

10.4 Random bit generation (FCS_RBG) ....................................................................................................................................34

10.4.1 Family behaviour ............................................................................................................................................................34

10.4.2 Components leveling and description ..........................................................................................................34

10.4.3 Management of FCS_RBG.1, FCS_RBG.2, FCS_RBG.3, FCS_RBG.4, FCS_

RBG.5, FCS_RBG.6 ........................................................................................................................................................... 35

10.4.4 Audit of FCS_RBG.1, FCS_RBG.2 ......................................................................................................................... 35

10.4.5 Audit of FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RBG.6 ............................................................ 35

10.4.6 FCS_RBG.1 Random bit generation (RBG) ................................................................................................ 35

10.4.7 FCS_RBG.2 Random bit generation (external seeding) .................................................................36

10.4.8 FCS_RBG.3 Random bit generation (internal seeding – single source) ..........................36

10.4.9 FCS_RBG.4 Random bit generation (internal seeding – multiple sources) .................. 37

10.4.10 FCS_RBG.5 Random bit generation (combining noise sources) ............................................. 37

10.4.11 FCS_RBG.6 Random bit generation service ............................................................................................. 37

10.5 Generation of random numbers (FCS_RNG) .............................................................................................................. 37

10.5.1 Family behaviour ............................................................................................................................................................ 37

10.5.2 Components leveling and description ..........................................................................................................38

10.5.3 Management of FCS_RNG.1 ....................................................................................................................................38

10.5.4 Audit of FCS_RNG.1 .......................................................................................................................................................38

10.5.5 FCS_RNG.1 Random number generation ....................................................................................................38

11 Class FDP: User data protection........................................................................................................................................................38

11.1 Class description ................................................................................................................................................................................38

11.2 Access control policy (FDP_ACC) .........................................................................................................................................40

11.2.1 Family behaviour ............................................................................................................................................................40

11.2.2 Components leveling and description .......................................................................................................... 41

11.2.3 Management of FDP_ACC.1, FDP_ACC.2 ....................................................................................................... 41

11.2.4 Audit of FDP_ACC.1, FDP_ACC.2 .......................................................................................................................... 41

11.2.5 FDP_ACC.1 Subset access control ...................................................................................................................... 41

11.2.6 FDP_ACC.2 Complete access control .............................................................................................................. 41

11.3 Access control functions (FDP_ACF) ................................................................................................................................ 42

11.3.1 Family behaviour ............................................................................................................................................................ 42

11.3.2 Components leveling and description .......................................................................................................... 42

11.3.3 Management of FDP_ACF.1 ...................................................................................................................................... 42

11.3.4 Audit of FDP_ACF.1 ......................................................................................................................................................... 42

11.3.5 FDP_ACF.1 Security attribute-based access control ........................................................................ 42

11.4 Data authentication (FDP_DAU) ........................................................................................................................................... 43

11.4.1 Family behaviour ............................................................................................................................................................ 43

11.4.2 Components leveling and description .......................................................................................................... 43

11.4.3 Management of FDP_DAU.1, FDP_DAU.2 ...................................................................................................... 43

11.4.4 Audit of FDP_DAU.1 ........................................................................................................................................................ 43

11.4.5 Audit of FDP_DAU.2 .......................................................................................................................................................44

11.4.6 FDP_DAU.1 Basic Data Authentication .........................................................................................................44

11.4.7 FDP_DAU.2 Data Authentication with Identity of Guarantor ...................................................44

11.5 Export from the TOE (FDP_ETC) .........................................................................................................................................44

11.5.1 Family behaviour ............................................................................................................................................................44

11.5.2 Components leveling and description .......................................................................................................... 45

11.5.3 Management of FDP_ETC.1 ..................................................................................................................................... 45

11.5.4 Management of FDP_ETC.2 ..................................................................................................................................... 45

11.5.5 Audit of FDP_ETC.1, FDP_ETC.2 .......................................................................................................................... 45

11.5.6 FDP_ETC.1 Export of user data without security attributes .................................................... 45

11.5.7 FDP_ETC.2 Export of user data with security attributes ............................................................ 45

11.6 Information flow control policy (FDP_IFC) ................................................................................................................46

© ISO/IEC 2022 – All rights reserved
---------------------- Page: 5 ----------------------
ISO/IEC 15408-2:2022(E)

11.6.1 Family behaviour ............................................................................................................................................................46

11.6.2 Components leveling and description ..........................................................................................................46

11.6.3 Management of FDP_IFC.1, FDP_IFC.2 ........................................................................................................... 47

11.6.4 Audit of FDP_IFC.1, FDP_IFC.2 .............................................................................................................................. 47

11.6.5 FDP_IFC.1 Subset information flow control............................................................................................. 47

11.6.6 FDP_IFC.2 Compl
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.