oSIST prEN ISO/IEC 15408-2:2023
(Main)Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2022)
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2022)
This document defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common security functionality requirements of many IT products.
Informationssicherheit, Cybersicherheit und Schutz der Privatsphäre - Evaluationskriterien für IT-Sicherheit - Teil 2: Sicherheit funktionale Komponenten (ISO/IEC 15408-2:2022)
Sécurité de l'information, cybersécurité et protection de la vie privée - Critères d'évaluation pour la sécurité des technologies de l'information - Partie 2: Composants fonctionnels de sécurité (ISO/IEC 15408-2:2022)
Informacijska varnost, kibernetska varnost in varovanje zasebnosti - Merila za vrednotenje varnosti IT - 2. del: Funkcionalne varnostne komponente (ISO/IEC 15408-2:2022)
General Information
Relations
Standards Content (Sample)
SLOVENSKI STANDARD
oSIST prEN ISO/IEC 15408-2:2023
01-oktober-2023
Informacijska varnost, kibernetska varnost in varovanje zasebnosti - Merila za
vrednotenje varnosti IT - 2. del: Funkcionalne varnostne komponente (ISO/IEC
15408-2:2022)
Information security, cybersecurity and privacy protection - Evaluation criteria for IT
security - Part 2: Security functional components (ISO/IEC 15408-2:2022)
Informationssicherheit, Cybersicherheit und Schutz der Privatsphäre -
Evaluationskriterien für IT-Sicherheit - Teil 2: Sicherheit funktionale Komponenten
(ISO/IEC 15408-2:2022)
Sécurité de l'information, cybersécurité et protection de la vie privée - Critères
d'évaluation pour la sécurité des technologies de l'information - Partie 2: Composants
fonctionnels de sécurité (ISO/IEC 15408-2:2022)
Ta slovenski standard je istoveten z: prEN ISO/IEC 15408-2
ICS:
35.030 Informacijska varnost IT Security
oSIST prEN ISO/IEC 15408-2:2023 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
---------------------- Page: 1 ----------------------
oSIST prEN ISO/IEC 15408-2:2023
---------------------- Page: 2 ----------------------
oSIST prEN ISO/IEC 15408-2:2023
INTERNATIONAL ISO/IEC
STANDARD 15408-2
Fourth edition
2022-08
Information security, cybersecurity
and privacy protection — Evaluation
criteria for IT security —
Part 2:
Security functional components
Sécurité de l'information, cybersécurité et protection de la vie
privée — Critères d'évaluation pour la sécurité des technologies de
l'information —
Partie 2: Composants fonctionnels de sécurité
Reference number
ISO/IEC 15408-2:2022(E)
© ISO/IEC 2022
---------------------- Page: 3 ----------------------
oSIST prEN ISO/IEC 15408-2:2023
ISO/IEC 15408-2:2022(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2022
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 4 ----------------------
oSIST prEN ISO/IEC 15408-2:2023
ISO/IEC 15408-2:2022(E)
Contents Page
Foreword . xv
Introduction . xvii
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 3
5 Overview . 4
5.1 General . 4
5.2 Organization of this document . . 4
6 Functional requirements paradigm . .5
7 Security functional components .9
7.1 Overview . 9
7.1.1 General . 9
7.1.2 Class structure . 9
7.1.3 Family structure . 10
7.1.4 Component structure . 11
7.2 Component catalogue .13
8 Class FAU: Security audit .14
8.1 Class description . 14
8.2 Security audit automatic response (FAU_ARP) . 15
8.2.1 Family behaviour .15
8.2.2 Components leveling and description . 15
8.2.3 Management of FAU_ARP.1 . 15
8.2.4 Audit of FAU_ARP.1 . 15
8.2.5 FAU_ARP.1 Security alarms . 15
8.3 Security audit data generation (FAU_GEN) . 15
8.3.1 Family behaviour . 15
8.3.2 Components leveling and description . 15
8.3.3 Management of FAU_GEN.1, FAU_GEN.2 . 16
8.3.4 Audit of FAU_GEN.1, FAU_GEN.2. 16
8.3.5 FAU_GEN.1 Audit data generation . 16
8.3.6 FAU_GEN.2 User identity association . 16
8.4 Security audit analysis (FAU_SAA) . 17
8.4.1 Family behaviour . 17
8.4.2 Components leveling and description . 17
8.4.3 Management of FAU_SAA.1 . 17
8.4.4 Management of FAU_SAA.2 . 18
8.4.5 Management of FAU_SAA.3 . 18
8.4.6 Management of FAU_SAA.4 . 18
8.4.7 Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4 . 18
8.4.8 FAU_SAA.1 Potential violation analysis . 18
8.4.9 FAU_SAA.2 Profile based anomaly detection . 18
8.4.10 FAU_SAA.3 Simple attack heuristics . 19
8.4.11 FAU_SAA.4 Complex attack heuristics . 19
8.5 Security audit review (FAU_SAR) . 20
8.5.1 Family behaviour .20
8.5.2 Components leveling and description . 20
8.5.3 Management of FAU_SAR.1 . 20
8.5.4 Management of FAU_SAR.2, FAU_SAR.3 . 20
8.5.5 Audit of FAU_SAR.1 . .20
8.5.6 Audit of FAU_SAR.2 . 21
iii
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 5 ----------------------
oSIST prEN ISO/IEC 15408-2:2023
ISO/IEC 15408-2:2022(E)
8.5.7 Audit of FAU_SAR.3 . 21
8.5.8 FAU_SAR.1 Audit review . 21
8.5.9 FAU_SAR.2 Restricted audit review . 21
8.5.10 FAU_SAR.3 Selectable audit review . 21
8.6 Security audit event selection (FAU_SEL) . 22
8.6.1 Family behaviour .22
8.6.2 Components leveling and description . 22
8.6.3 Management of FAU_SEL.1 . 22
8.6.4 Audit of FAU_SEL.1.22
8.6.5 FAU_SEL.1 Selective audit . 22
8.7 Security audit data storage (FAU_STG) . 22
8.7.1 Family behaviour .22
8.7.2 Components leveling and description . 23
8.7.3 Management of FAU_STG.1 . 23
8.7.4 Management of FAU_STG.2 . 23
8.7.5 Management of FAU_STG.3 . 23
8.7.6 Management of FAU_STG.4 . 23
8.7.7 Management of FAU_STG.5 . 23
8.7.8 Audit of FAU_STG.1 . 24
8.7.9 Audit of FAU_STG.2, FAU_STG.3 . 24
8.7.10 Audit of FAU_STG.4 . 24
8.7.11 Audit of FAU_STG.5 . 24
8.7.12 FAU_STG.1 Audit data storage location . 24
8.7.13 FAU_STG.2 Protected audit data storage . 24
8.7.14 FAU_STG.3 Guarantees of audit data availability . 25
8.7.15 FAU_STG.4 Action in case of possible audit data loss . 25
8.7.16 FAU_STG.5 Prevention of audit data loss . 25
9 Class FCO: Communication .25
9.1 Class description .25
9.2 Non-repudiation of origin (FCO_NRO) . 26
9.2.1 Family behaviour .26
9.2.2 Components leveling and description . 26
9.2.3 Management of FCO_NRO.1, FCO_NRO.2 . 26
9.2.4 Audit of FCO_NRO.1 .26
9.2.5 Audit of FCO_NRO.2 . 27
9.2.6 FCO_NRO.1 Selective proof of origin . 27
9.2.7 FCO_NRO.2 Enforced proof of origin . 27
9.3 Non-repudiation of receipt (FCO_NRR) .28
9.3.1 Family behaviour .28
9.3.2 Components leveling and description .28
9.3.3 Management of FCO_NRR.1, FCO_NRR.2 .28
9.3.4 Audit of FCO_NRR.1.28
9.3.5 Audit of FCO_NRR.2 .28
9.3.6 FCO_NRR.1 Selective proof of receipt .29
9.3.7 FCO_NRR.2 Enforced proof of receipt .29
10 Class FCS: Cryptographic support .29
10.1 Class description .29
10.2 Cryptographic key management (FCS_CKM) .30
10.2.1 Family behaviour .30
10.2.2 Components leveling and description .30
10.2.3 Management of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6 . 31
10.2.4 Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6 . 31
10.2.5 FCS_CKM.1 Cryptographic key generation . 31
10.2.6 FCS_CKM.2 Cryptographic key distribution . 32
10.2.7 FCS_CKM.3 Cryptographic key access . 32
10.2.8 FCS_CKM.4 Cryptographic key destruction . 32
10.2.9 FCS_CKM.5 Cryptographic key derivation . 33
iv
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 6 ----------------------
oSIST prEN ISO/IEC 15408-2:2023
ISO/IEC 15408-2:2022(E)
10.2.10 FCS_CKM.6 Timing and event of cryptographic key destruction .33
10.3 Cryptographic operation (FCS_COP) . 33
10.3.1 Family behaviour .33
10.3.2 Components leveling and description . 33
10.3.3 Management of FCS_COP.1 .34
10.3.4 Audit of FCS_COP.1 .34
10.3.5 FCS_COP.1 Cryptographic operation .34
10.4 Random bit generation (FCS_RBG) .34
10.4.1 Family behaviour .34
10.4.2 Components leveling and description .34
10.4.3 Management of FCS_RBG.1, FCS_RBG.2, FCS_RBG.3, FCS_RBG.4, FCS_
RBG.5, FCS_RBG.6 . 35
10.4.4 Audit of FCS_RBG.1, FCS_RBG.2 . 35
10.4.5 Audit of FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RBG.6 . 35
10.4.6 FCS_RBG.1 Random bit generation (RBG) . 35
10.4.7 FCS_RBG.2 Random bit generation (external seeding) .36
10.4.8 FCS_RBG.3 Random bit generation (internal seeding – single source) .36
10.4.9 FCS_RBG.4 Random bit generation (internal seeding – multiple sources) . 37
10.4.10 FCS_RBG.5 Random bit generation (combining noise sources) . 37
10.4.11 FCS_RBG.6 Random bit generation service . 37
10.5 Generation of random numbers (FCS_RNG) . 37
10.5.1 Family behaviour . 37
10.5.2 Components leveling and description .38
10.5.3 Management of FCS_RNG.1 .38
10.5.4 Audit of FCS_RNG.1 .38
10.5.5 FCS_RNG.1 Random number generation .38
11 Class FDP: User data protection.38
11.1 Class description .38
11.2 Access control policy (FDP_ACC) .40
11.2.1 Family behaviour .40
11.2.2 Components leveling and description . 41
11.2.3 Management of FDP_ACC.1, FDP_ACC.2 . 41
11.2.4 Audit of FDP_ACC.1, FDP_ACC.2 . 41
11.2.5 FDP_ACC.1 Subset access control . 41
11.2.6 FDP_ACC.2 Complete access control . 41
11.3 Access control functions (FDP_ACF) . 42
11.3.1 Family behaviour . 42
11.3.2 Components leveling and description . 42
11.3.3 Management of FDP_ACF.1 . 42
11.3.4 Audit of FDP_ACF.1 . 42
11.3.5 FDP_ACF.1 Security attribute-based access control . 42
11.4 Data authentication (FDP_DAU) . 43
11.4.1 Family behaviour . 43
11.4.2 Components leveling and description . 43
11.4.3 Management of FDP_DAU.1, FDP_DAU.2 . 43
11.4.4 Audit of FDP_DAU.1 . 43
11.4.5 Audit of FDP_DAU.2 .44
11.4.6 FDP_DAU.1 Basic Data Authentication .44
11.4.7 FDP_DAU.2 Data Authentication with Identity of Guarantor .44
11.5 Export from the TOE (FDP_ETC) .44
11.5.1 Family behaviour .44
11.5.2 Components leveling and description . 45
11.5.3 Management of FDP_ETC.1 . 45
11.5.4 Management of FDP_ETC.2 . 45
11.5.5 Audit of FDP_ETC.1, FDP_ETC.2 .
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.