Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components

This document defines the assurance requirements of the ISO/IEC 15408 series. It includes the individual assurance components from which the evaluation assurance levels and other packages contained in ISO/IEC 15408-5 are composed, and the criteria for evaluation of Protection Profiles (PPs), PP-Configurations, PP-Modules, and Security Targets (STs).

Sécurité de l'information, cybersécurité et protection de la vie privée — Critères d'évaluation pour la sécurité des technologies de l'information — Partie 3: Composants d'assurance de sécurité

General Information

Status
Published
Publication Date
08-Aug-2022
Current Stage
6060 - International Standard published
Due Date
15-Jun-2021
Completion Date
09-Aug-2022
Ref Project

RELATIONS

Buy Standard

Standard
ISO/IEC 15408-3:2022 - Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components Released:9. 08. 2022
English language
189 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (sample)

INTERNATIONAL ISO/IEC
STANDARD 15408-3
Fourth edition
2022-08
Information security, cybersecurity
and privacy protection — Evaluation
criteria for IT security —
Part 3:
Security assurance components
Sécurité de l'information, cybersécurité et protection de la vie
privée — Critères d'évaluation pour la sécurité des technologies de
l'information —
Partie 3: Composants d'assurance de sécurité
Reference number
ISO/IEC 15408-3:2022(E)
© ISO/IEC 2022
---------------------- Page: 1 ----------------------
ISO/IEC 15408-3:2022(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2022

All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may

be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on

the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below

or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC 15408-3:2022(E)
Contents Page

Foreword ..........................................................................................................................................................................................................................................x

Introduction .............................................................................................................................................................................................................................xii

1 Scope ................................................................................................................................................................................................................................. 1

2 Normative references ..................................................................................................................................................................................... 1

3 Terms and definitions .................................................................................................................................................................................... 1

4 Overview ....................................................................................................................................................................................................................... 5

5 Assurance paradigm ........................................................................................................................................................................................6

5.1 General ........................................................................................................................................................................................................... 6

5.2 ISO/IEC 15408 series approach ............................................................................................................................................... 6

5.3 Assurance approach .......................................................................................................................................................................... 6

5.3.1 General ........................................................................................................................................................................................ 6

5.3.2 Significance of vulnerabilities ................................................................................................................................ 6

5.3.3 Cause of vulnerabilities ................................................................................................................................................ 7

5.3.4 ISO/IEC 15408 series assurance .......................................................................................................................... 7

5.3.5 Assurance through evaluation ............................................................................................................................... 7

5.4 ISO/IEC 15408 series evaluation assurance scale .................................................................................................. 8

6 Security assurance components ......................................................................................................................................................... 8

6.1 General ........................................................................................................................................................................................................... 8

6.2 Assurance class structure ............................................................................................................................................................ 8

6.2.1 General ........................................................................................................................................................................................ 8

6.2.2 Class name ............................................................................................................................................................................... 8

6.2.3 Class introduction ............................................................................................................................................................. 8

6.2.4 Assurance families ........................................................................................................................................................... 9

6.3 Assurance family structure ........................................................................................................................................................ 9

6.3.1 Family name ........................................................................................................................................................................... 9

6.3.2 Objectives ................................................................................................................................................................................. 9

6.3.3 Component levelling ..................................................................................................................................................... 10

6.3.4 Application notes ............................................................................................................................................................ 10

6.3.5 Assurance components .............................................................................................................................................. 10

6.4 Assurance component structure ......................................................................................................................................... 10

6.4.1 General ..................................................................................................................................................................................... 10

6.4.2 Component identification ........................................................................................................................................ 11

6.4.3 Objectives .............................................................................................................................................................................. 11

6.4.4 Application notes ............................................................................................................................................................ 11

6.4.5 Dependencies ...................................................................................................................................................................... 11

6.4.6 Assurance elements ...................................................................................................................................................... 11

6.5 Assurance elements ........................................................................................................................................................................12

6.6 Component taxonomy ...................................................................................................................................................................12

7 Class APE: Protection Profile (PP) evaluation ..................................................................................................................12

7.1 General ........................................................................................................................................................................................................12

7.2 PP introduction (APE_INT) ...................................................................................................................................................... 13

7.2.1 Objectives ..............................................................................................................................................................................13

7.2.2 APE_INT.1 PP introduction .................................................................................................................................... 13

7.3 Conformance claims (APE_CCL) ........................................................................................................................................... 14

7.3.1 Objectives .............................................................................................................................................................................. 14

7.3.2 APE_CCL.1 Conformance claims ........................................................................................................................ 14

7.4 Security problem definition (APE_SPD) ........................................................................................................................ 16

7.4.1 Objectives .............................................................................................................................................................................. 16

7.4.2 APE_SPD.1 Security problem definition ..................................................................................................... 16

7.5 Security objectives (APE_OBJ) .............................................................................................................................................. 16

7.5.1 Objectives .............................................................................................................................................................................. 16

7.5.2 Component levelling ..................................................................................................................................................... 17

iii
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 3 ----------------------
ISO/IEC 15408-3:2022(E)

7.5.3 APE_OBJ.1 Security objectives for the operational environment ........................................ 17

7.5.4 APE_OBJ.2 Security objectives ............................................................................................................................ 17

7.6 Extended components definition (APE_ECD) ........................................................................................................... 18

7.6.1 Objectives .............................................................................................................................................................................. 18

7.6.2 APE_ECD.1 Extended components definition ........................................................................................ 18

7.7 Security requirements (APE_REQ) ................................................................................................................................... 19

7.7.1 Objectives .............................................................................................................................................................................. 19

7.7.2 Component levelling ..................................................................................................................................................... 19

7.7.3 APE_REQ.1 Direct rationale PP-Module security requirements ................................... ........ 19

7.7.4 APE_REQ.2 Derived security requirements ........................................................................................... 20

8 Class ACE: Protection Profile Configuration evaluation ........................................................................................22

8.1 General ........................................................................................................................................................................................................22

8.2 PP-Module introduction (ACE_INT) .................................................................................................................................. 22

8.2.1 Objectives ..............................................................................................................................................................................22

8.2.2 ACE_INT.1 PP-Module introduction ................................................................................................................ 22

8.3 PP-Module conformance claims (ACE_CCL) ............................................................................................................... 23

8.3.1 Objectives ..............................................................................................................................................................................23

8.3.2 ACE_CCL.1 PP-Module conformance claims ............................................................................................ 23

8.4 PP-Module security problem definition (ACE_SPD) ........................................................................................... 25

8.4.1 Objectives .............................................................................................................................................................................. 25

8.4.2 ACE_SPD.1 PP-Module security problem definition ......................................................................... 25

8.5 PP-Module security objectives (ACE_OBJ) .................................................................................................................. 26

8.5.1 Objectives .............................................................................................................................................................................. 26

8.5.2 Component levelling ..................................................................................................................................................... 26

8.5.3 ACE_OBJ.1 PP-Module security objectives for the operational environment ............26

8.5.4 ACE_OBJ.2 PP-Module security objectives................................................................................................ 27

8.6 PP-Module extended components definition (ACE_ECD)............................................................................... 27

8.6.1 Objectives .............................................................................................................................................................................. 27

8.6.2 ACE_ECD.1 PP-Module extended components definition ............................................................28

8.7 PP-Module security requirements (ACE_REQ) .......................................................................................................28

8.7.1 Objectives ..............................................................................................................................................................................28

8.7.2 Component levelling .....................................................................................................................................................29

8.7.3 ACE_REQ.1 PP-Module stated security requirements ...................................................................29

8.7.4 ACE_REQ.2 PP-Module derived security requirements ...............................................................30

8.8 PP-Module consistency (ACE_MCO) .................................................................................................................................. 31

8.8.1 Objectives .............................................................................................................................................................................. 31

8.8.2 ACE_MCO.1 PP-Module consistency ............................................................................................................... 31

8.9 PP-Configuration consistency (ACE_CCO) ................................................................................................................... 32

8.9.1 Objectives .............................................................................................................................................................................. 32

8.9.2 ACE_CCO.1 PP-Configuration consistency ................................................................................................ 32

9 Class ASE: Security Target (ST) evaluation ..........................................................................................................................36

9.1 General ........................................................................................................................................................................................................36

9.2 ST introduction (ASE_INT) ....................................................................................................................................................... 36

9.2.1 Objectives ..............................................................................................................................................................................36

9.2.2 ASE_INT.1 ST introduction .....................................................................................................................................36

9.3 Conformance claims (ASE_CCL) ........................................................................................................................................... 37

9.3.1 Objectives .............................................................................................................................................................................. 37

9.3.2 ASE_CCL.1 Conformance claims ........................................................................................................................ 37

9.4 Security problem definition (ASE_SPD) ........................................................................................................................ 39

9.4.1 Objectives ..............................................................................................................................................................................39

9.4.2 ASE_SPD.1 Security problem definition .....................................................................................................39

9.5 Security objectives (ASE_OBJ) ...............................................................................................................................................40

9.5.1 Objectives ..............................................................................................................................................................................40

9.5.2 Component levelling .....................................................................................................................................................40

9.5.3 ASE_OBJ.1 Security objectives for the operational environment ........................................40

9.5.4 ASE_OBJ.2 Security objectives ............................................................................................................................ 41

9.6 Extended components definition (ASE_ECD) ........................................................................................................... 42

© ISO/IEC 2022 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC 15408-3:2022(E)

9.6.1 Objectives .............................................................................................................................................................................. 42

9.6.2 ASE_ECD.1 Extended components definition ........................................................................................ 42

9.7 Security requirements (ASE_REQ).................................................................................................................................... 43

9.7.1 Objectives .............................................................................................................................................................................. 43

9.7.2 Component levelling ..................................................................................................................................................... 43

9.7.3 ASE_REQ.1 Direct rationale security requirements ........................................................................ 43

9.7.4 ASE_REQ.2 Derived security requirements ............................................................................................44

9.8 TOE summary specification (ASE_TSS) ........................................................................................................................ 45

9.8.1 Objectives .............................................................................................................................................................................. 45

9.8.2 Component levelling .....................................................................................................................................................46

9.8.3 ASE_TSS.1 TOE summary specification ......................................................................................................46

9.8.4 ASE_TSS.2 TOE summary specification with architectural design summary .........46

9.9 Consistency of composite product Security Target (ASE_COMP) .......................................................... 47

9.9.1 Objectives .............................................................................................................................................................................. 47

9.9.2 Component levelling ..................................................................................................................................................... 47

9.9.3 Application notes ............................................................................................................................................................ 47

9.9.4 ASE_COMP.1 Consistency of Security Target (ST) .............................................................................48

10 Class ADV: Development ...........................................................................................................................................................................49

10.1 General ........................................................................................................................................................................................................49

10.2 Security Architecture (ADV_ARC) ..................................................................................................................................... 53

10.2.1 Objectives ..............................................................................................................................................................................53

10.2.2 Component levelling .....................................................................................................................................................53

10.2.3 Application notes ............................................................................................................................................................54

10.2.4 ADV_ARC.1 Security architecture description .....................................................................................54

10.3 Functional specification (ADV_FSP) ................................................................................................................................. 55

10.3.1 Objectives .............................................................................................................................................................................. 55

10.3.2 Component levelling ..................................................................................................................................................... 55

10.3.3 Application notes ............................................................................................................................................................56

10.3.4 ADV_FSP.1 Basic functional specification .................................................................................................58

10.3.5 ADV_FSP.2 Security-enforcing functional specification............................................................... 59

10.3.6 ADV_FSP.3 Functional specification with complete summary ............................................... 59

10.3.7 ADV_FSP.4 Complete functional specification .......................................................................................60

10.3.8 ADV_FSP.5 Complete semi-formal functional specification with additional

error information ........................................................................................................................................................... 61

10.3.9 ADV_FSP.6 Complete semi-formal functional specification with additional

formal specification ...................................................................................................................................................... 62

10.4 Implementation representation (ADV_IMP) ..............................................................................................................63

10.4.1 Objectives ..............................................................................................................................................................................63

10.4.2 Component levelling .....................................................................................................................................................64

10.4.3 Application notes ............................................................................................................................................................64

10.4.4 ADV_IMP.1 Implementation representation of the TSF .................................................................65

10.4.5 ADV_IMP.2 Complete mapping of the implementation representation of the

TSF ...............................................................................................................................................................................................65

10.5 TSF internals (ADV_INT) ............................................................................................................................................................66

10.5.1 Objectives ..............................................................................................................................................................................66

10.5.2 Component levelling .....................................................................................................................................................66

10.5.3 Application notes ............................................................................................................................................................66

10.5.4 ADV_INT.1 Well-structured subset of TSF internals ....................................................................... 67

10.5.5 ADV_INT.2 Well-structured internals ...........................................................................................................68

10.5.6 ADV_INT.3 Minimally complex internals ...................................................................................................68

10.6 Security policy modelling (ADV_SPM) ............................................................................................................................ 69

10.6.1 Objectives ..............................................................................................................................................................................69

10.6.2 Component levelling ..................................................................................................................................................... 70

10.6.3 Application notes ............................................................................................................................................................ 70

10.6.4 ADV_SPM.1 Formal TOE security policy model .................................................................................... 70

10.7 TOE design (ADV_TDS) .................................................................................................................................................................72

10.7.1 Objecti
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.