Skip to main content
Back

Sorry - this product is no longer available

prEN ISO/IEC 15408-5

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements (ISO/IEC DIS 15408-5:2024)

General information

Draft
Base Documents
ISO/IEC DIS 15408-5; prEN ISO/IEC 15408-5
Directives or regulations
None
You can view draft standards in the Commenting portal🡭.

Standard history

Status
Date
Type
Name
Main
prEN ISO/IEC 15408-5
15.12.2023
Main
This document provides packages of security assurance and security functional requirements that have been identified as useful in support of common usage by stakeholders.
EXAMPLE        Examples of provided packages include the evaluation assurance levels (EAL) and the composed assurance packages (CAPs).
This document presents:
—    evaluation assurance level (EAL) family of packages that specify pre-defined sets of security assurance components that may be referenced in PPs and STs and which specify appropriate security assurances to be provided during an evaluation of a target of evaluation (TOE);
—    composition assurance (CAP) family of packages that specify sets of security assurance components used for specifying appropriate security assurances to be provided during an evaluation of composed TOEs;
—    composite product (COMP) package that specifies a set of security assurance components used for specifying appropriate security assurances to be provided during an evaluation of a composite product TOEs;
—    protection profile assurance (PPA) family of packages that specify sets of security assurance components used for specifying appropriate security assurances to be provided during a protection profile evaluation;
—    security target assurance (STA) family of packages that specify sets of security assurance components used for specifying appropriate security assurances to be provided during a security target evaluation.
The users of this document can include consumers, developers, and evaluators of secure IT products.

Required fields are indicated with *

*
*
*
Standard monitoring