{"id":350593,"date":"2024-10-20T00:43:06","date_gmt":"2024-10-20T00:43:06","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-15408-22020\/"},"modified":"2024-10-26T00:30:52","modified_gmt":"2024-10-26T00:30:52","slug":"bs-en-iso-iec-15408-22020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-15408-22020\/","title":{"rendered":"BS EN ISO\/IEC 15408-2:2020"},"content":{"rendered":"

This part of ISO\/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common security functionality requirements of many IT products.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
5<\/td>\nEuropean foreword
Endorsement notice <\/td>\n<\/tr>\n
25<\/td>\nScope
Normative references
Terms and definitions, symbols and abbreviated terms
Overview
Organisation of this part of ISO\/IEC 15408 <\/td>\n<\/tr>\n
26<\/td>\nFunctional requirements paradigm <\/td>\n<\/tr>\n
29<\/td>\nSecurity functional components
Overview
Class structure <\/td>\n<\/tr>\n
30<\/td>\nClass name
Class introduction
Family structure
Family name
Family behaviour <\/td>\n<\/tr>\n
31<\/td>\nComponent levelling
Management
Audit <\/td>\n<\/tr>\n
32<\/td>\nComponent structure
Component identification
Functional elements
Dependencies <\/td>\n<\/tr>\n
33<\/td>\nComponent catalogue <\/td>\n<\/tr>\n
34<\/td>\nComponent changes highlighting
Class FAU: Security audit <\/td>\n<\/tr>\n
35<\/td>\nSecurity audit automatic response (FAU_ARP)
Family Behaviour
Component levelling
Management of FAU_ARP.1
Audit of FAU_ARP.1
FAU_ARP.1 Security alarms
FAU_ARP.1.1
Security audit data generation (FAU_GEN)
Family Behaviour
Component levelling
Management of FAU_GEN.1, FAU_GEN.2
Audit of FAU_GEN.1, FAU_GEN.2 <\/td>\n<\/tr>\n
36<\/td>\nFAU_GEN.1 Audit data generation
FAU_GEN.1.1
FAU_GEN.1.2
FAU_GEN.2 User identity association
FAU_GEN.2.1
Security audit analysis (FAU_SAA)
Family Behaviour
Component levelling <\/td>\n<\/tr>\n
37<\/td>\nManagement of FAU_SAA.1
Management of FAU_SAA.2
Management of FAU_SAA.3
Management of FAU_SAA.4
Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4
FAU_SAA.1 Potential violation analysis <\/td>\n<\/tr>\n
38<\/td>\nFAU_SAA.1.1
FAU_SAA.1.2
FAU_SAA.2 Profile based anomaly detection
FAU_SAA.2.1
FAU_SAA.2.2
FAU_SAA.2.3
FAU_SAA.3 Simple attack heuristics
FAU_SAA.3.1
FAU_SAA.3.2
FAU_SAA.3.3 <\/td>\n<\/tr>\n
39<\/td>\nFAU_SAA.4 Complex attack heuristics
FAU_SAA.4.1
FAU_SAA.4.2
FAU_SAA.4.3
Security audit review (FAU_SAR)
Family Behaviour
Component levelling
Management of FAU_SAR.1
Management of FAU_SAR.2, FAU_SAR.3
Audit of FAU_SAR.1 <\/td>\n<\/tr>\n
40<\/td>\nAudit of FAU_SAR.2
Audit of FAU_SAR.3
FAU_SAR.1 Audit review
FAU_SAR.1.1
FAU_SAR.1.2
FAU_SAR.2 Restricted audit review
FAU_SAR.2.1
FAU_SAR.3 Selectable audit review
FAU_SAR.3.1
Security audit event selection (FAU_SEL)
Family Behaviour <\/td>\n<\/tr>\n
41<\/td>\nComponent levelling
Management of FAU_SEL.1
Audit of FAU_SEL.1
FAU_SEL.1 Selective audit
FAU_SEL.1.1
Security audit event storage (FAU_STG)
Family Behaviour
Component levelling <\/td>\n<\/tr>\n
42<\/td>\nManagement of FAU_STG.1
Management of FAU_STG.2
Management of FAU_STG.3
Management of FAU_STG.4
Audit of FAU_STG.1, FAU_STG.2
Audit of FAU_STG.3
Audit of FAU_STG.4
FAU_STG.1 Protected audit trail storage
FAU_STG.1.1
FAU_STG.1.2 <\/td>\n<\/tr>\n
43<\/td>\nFAU_STG.2 Guarantees of audit data availability
FAU_STG.2.1
FAU_STG.2.2
FAU_STG.2.3
FAU_STG.3 Action in case of possible audit data loss
FAU_STG.3.1
FAU_STG.4 Prevention of audit data loss
FAU_STG.4.1 <\/td>\n<\/tr>\n
44<\/td>\nClass FCO: Communication
Non-repudiation of origin (FCO_NRO)
Family Behaviour
Component levelling
Management of FCO_NRO.1, FCO_NRO.2
Audit of FCO_NRO.1 <\/td>\n<\/tr>\n
45<\/td>\nAudit of FCO_NRO.2
FCO_NRO.1 Selective proof of origin
FCO_NRO.1.1
FCO_NRO.1.2
FCO_NRO.1.3
FCO_NRO.2 Enforced proof of origin
FCO_NRO.2.1
FCO_NRO.2.2
FCO_NRO.2.3 <\/td>\n<\/tr>\n
46<\/td>\nNon-repudiation of receipt (FCO_NRR)
Family Behaviour
Component levelling
Management of FCO_NRR.1, FCO_NRR.2
Audit of FCO_NRR.1
Audit of FCO_NRR.2
FCO_NRR.1 Selective proof of receipt
FCO_NRR.1.1 <\/td>\n<\/tr>\n
47<\/td>\nFCO_NRR.1.2
FCO_NRR.1.3
FCO_NRR.2 Enforced proof of receipt
FCO_NRR.2.1
FCO_NRR.2.2
FCO_NRR.2.3 <\/td>\n<\/tr>\n
48<\/td>\nClass FCS: Cryptographic support
Cryptographic key management (FCS_CKM)
Family Behaviour
Component levelling <\/td>\n<\/tr>\n
49<\/td>\nManagement of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4
Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4
FCS_CKM.1 Cryptographic key generation
FCS_CKM.1.1
FCS_CKM.2 Cryptographic key distribution
FCS_CKM.2.1
FCS_CKM.3 Cryptographic key access <\/td>\n<\/tr>\n
50<\/td>\nFCS_CKM.3.1
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.4.1
Cryptographic operation (FCS_COP)
Family Behaviour
Component levelling
Management of FCS_COP.1
Audit of FCS_COP.1 <\/td>\n<\/tr>\n
51<\/td>\nFCS_COP.1 Cryptographic operation
FCS_COP.1.1
Class FDP: User data protection <\/td>\n<\/tr>\n
53<\/td>\nAccess control policy (FDP_ACC)
Family Behaviour <\/td>\n<\/tr>\n
54<\/td>\nComponent levelling
Management of FDP_ACC.1, FDP_ACC.2
Audit of FDP_ACC.1, FDP_ACC.2
FDP_ACC.1 Subset access control
FDP_ACC.1.1
FDP_ACC.2 Complete access control
FDP_ACC.2.1
FDP_ACC.2.2
Access control functions (FDP_ACF)
Family Behaviour
Component levelling <\/td>\n<\/tr>\n
55<\/td>\nManagement of FDP_ACF.1
Audit of FDP_ACF.1
FDP_ACF.1 Security attribute based access control
FDP_ACF.1.1
FDP_ACF.1.2
FDP_ACF.1.3
FDP_ACF.1.4 <\/td>\n<\/tr>\n
56<\/td>\nData authentication (FDP_DAU)
Family Behaviour
Component levelling
Management of FDP_DAU.1, FDP_DAU.2
Audit of FDP_DAU.1
Audit of FDP_DAU.2
FDP_DAU.1 Basic Data Authentication
FDP_DAU.1.1 <\/td>\n<\/tr>\n
57<\/td>\nFDP_DAU.1.2
FDP_DAU.2 Data Authentication with Identity of Guarantor
FDP_DAU.2.1
FDP_DAU.2.2
Export from the TOE (FDP_ETC)
Family Behaviour
Component levelling
Management of FDP_ETC.1
Management of FDP_ETC.2
Audit of FDP_ETC.1, FDP_ETC.2 <\/td>\n<\/tr>\n
58<\/td>\nFDP_ETC.1 Export of user data without security attributes
FDP_ETC.1.1
FDP_ETC.1.2
FDP_ETC.2 Export of user data with security attributes
FDP_ETC.2.1
FDP_ETC.2.2
FDP_ETC.2.3
FDP_ETC.2.4
Information flow control policy (FDP_IFC)
Family Behaviour <\/td>\n<\/tr>\n
59<\/td>\nComponent levelling
Management of FDP_IFC.1, FDP_IFC.2
Audit of FDP_IFC.1, FDP_IFC.2
FDP_IFC.1 Subset information flow control
FDP_IFC.1.1
FDP_IFC.2 Complete information flow control
FDP_IFC.2.1
FDP_IFC.2.2
Information flow control functions (FDP_IFF)
Family Behaviour <\/td>\n<\/tr>\n
60<\/td>\nComponent levelling
Management of FDP_IFF.1, FDP_IFF.2
Management of FDP_IFF.3, FDP_IFF.4, FDP_IFF.5
Management of FDP_IFF.6
Audit of FDP_IFF.1, FDP_IFF.2, FDP_IFF.5 <\/td>\n<\/tr>\n
61<\/td>\nAudit of FDP_IFF.3, FDP_IFF.4, FDP_IFF.6
FDP_IFF.1 Simple security attributes
FDP_IFF.1.1
FDP_IFF.1.2
FDP_IFF.1.3
FDP_IFF.1.4
FDP_IFF.1.5
FDP_IFF.2 Hierarchical security attributes <\/td>\n<\/tr>\n
62<\/td>\nFDP_IFF.2.1
FDP_IFF.2.2
FDP_IFF.2.3
FDP_IFF.2.4
FDP_IFF.2.5
FDP_IFF.2.6
FDP_IFF.3 Limited illicit information flows
FDP_IFF.3.1 <\/td>\n<\/tr>\n
63<\/td>\nFDP_IFF.4 Partial elimination of illicit information flows
FDP_IFF.4.1
FDP_IFF.4.2
FDP_IFF.5 No illicit information flows
FDP_IFF.5.1
FDP_IFF.6 Illicit information flow monitoring
FDP_IFF.6.1
Import from outside of the TOE (FDP_ITC)
Family Behaviour
Component levelling <\/td>\n<\/tr>\n
64<\/td>\nManagement of FDP_ITC.1, FDP_ITC.2
Audit of FDP_ITC.1, FDP_ITC.2
FDP_ITC.1 Import of user data without security attributes
FDP_ITC.1.1
FDP_ITC.1.2
FDP_ITC.1.3
FDP_ITC.2 Import of user data with security attributes <\/td>\n<\/tr>\n
65<\/td>\nFDP_ITC.2.1
FDP_ITC.2.2
FDP_ITC.2.3
FDP_ITC.2.4
FDP_ITC.2.5
Internal TOE transfer (FDP_ITT)
Family Behaviour
Component levelling
Management of FDP_ITT.1, FDP_ITT.2 <\/td>\n<\/tr>\n
66<\/td>\nManagement of FDP_ITT.3, FDP_ITT.4
Audit of FDP_ITT.1, FDP_ITT.2
Audit of FDP_ITT.3, FDP_ITT.4
FDP_ITT.1 Basic internal transfer protection
FDP_ITT.1.1
FDP_ITT.2 Transmission separation by attribute
FDP_ITT.2.1 <\/td>\n<\/tr>\n
67<\/td>\nFDP_ITT.2.2
FDP_ITT.3 Integrity monitoring
FDP_ITT.3.1
FDP_ITT.3.2
FDP_ITT.4 Attribute-based integrity monitoring
FDP_ITT.4.1
FDP_ITT.4.2
Residual information protection (FDP_RIP)
Family Behaviour <\/td>\n<\/tr>\n
68<\/td>\nComponent levelling
Management of FDP_RIP.1, FDP_RIP.2
Audit of FDP_RIP.1, FDP_RIP.2
FDP_RIP.1 Subset residual information protection
FDP_RIP.1.1
FDP_RIP.2 Full residual information protection
FDP_RIP.2.1
Rollback (FDP_ROL)
Family Behaviour
Component levelling <\/td>\n<\/tr>\n
69<\/td>\nManagement of FDP_ROL.1, FDP_ROL.2
Audit of FDP_ROL.1, FDP_ROL.2
FDP_ROL.1 Basic rollback
FDP_ROL.1.1
FDP_ROL.1.2
FDP_ROL.2 Advanced rollback
FDP_ROL.2.1
FDP_ROL.2.2 <\/td>\n<\/tr>\n
70<\/td>\nStored data integrity (FDP_SDI)
Family Behaviour
Component levelling
Management of FDP_SDI.1
Management of FDP_SDI.2
Audit of FDP_SDI.1
Audit of FDP_SDI.2
FDP_SDI.1 Stored data integrity monitoring <\/td>\n<\/tr>\n
71<\/td>\nFDP_SDI.1.1
FDP_SDI.2 Stored data integrity monitoring and action
FDP_SDI.2.1
FDP_SDI.2.2
Inter-TSF user data confidentiality transfer protection (FDP
Family Behaviour
Component levelling
Management of FDP_UCT.1
Audit of FDP_UCT.1
FDP_UCT.1 Basic data exchange confidentiality <\/td>\n<\/tr>\n
72<\/td>\nFDP_UCT.1.1
Inter-TSF user data integrity transfer protection (FDP_UIT)
Family Behaviour
Component levelling
Management of FDP_UIT.1, FDP_UIT.2, FDP_UIT.3
Audit of FDP_UIT.1
Audit of FDP_UIT.2, FDP_UIT.3 <\/td>\n<\/tr>\n
73<\/td>\nFDP_UIT.1 Data exchange integrity
FDP_UIT.1.1
FDP_UIT.1.2
FDP_UIT.2 Source data exchange recovery
FDP_UIT.2.1
FDP_UIT.3 Destination data exchange recovery <\/td>\n<\/tr>\n
74<\/td>\nFDP_UIT.3.1
Class FIA: Identification and authentication <\/td>\n<\/tr>\n
75<\/td>\nAuthentication failures (FIA_AFL)
Family Behaviour
Component levelling <\/td>\n<\/tr>\n
76<\/td>\nManagement of FIA_AFL.1
Audit of FIA_AFL.1
FIA_AFL.1 Authentication failure handling
FIA_AFL.1.1
FIA_AFL.1.2
User attribute definition (FIA_ATD)
Family Behaviour
Component levelling
Management of FIA_ATD.1
Audit of FIA_ATD.1 <\/td>\n<\/tr>\n
77<\/td>\nFIA_ATD.1 User attribute definition
FIA_ATD.1.1
Specification of secrets (FIA_SOS)
Family Behaviour
Component levelling
Management of FIA_SOS.1
Management of FIA_SOS.2
Audit of FIA_SOS.1, FIA_SOS.2
FIA_SOS.1 Verification of secrets
FIA_SOS.1.1 <\/td>\n<\/tr>\n
78<\/td>\nFIA_SOS.2 TSF Generation of secrets
FIA_SOS.2.1
FIA_SOS.2.2
User authentication (FIA_UAU)
Family Behaviour
Component levelling
Management of FIA_UAU.1 <\/td>\n<\/tr>\n
79<\/td>\nManagement of FIA_UAU.2
Management of FIA_UAU.3, FIA_UAU.4, FIA_UAU.7
Management of FIA_UAU.5
Management of FIA_UAU.6
Audit of FIA_UAU.1
Audit of FIA_UAU.2
Audit of FIA_UAU.3 <\/td>\n<\/tr>\n
80<\/td>\nAudit of FIA_UAU.4
Audit of FIA_UAU.5
Audit of FIA_UAU.6
Audit of FIA_UAU.7
FIA_UAU.1 Timing of authentication
FIA_UAU.1.1
FIA_UAU.1.2
FIA_UAU.2 User authentication before any action
FIA_UAU.2.1 <\/td>\n<\/tr>\n
81<\/td>\nFIA_UAU.3 Unforgeable authentication
FIA_UAU.3.1
FIA_UAU.3.2
FIA_UAU.4 Single-use authentication mechanisms
FIA_UAU.4.1
FIA_UAU.5 Multiple authentication mechanisms
FIA_UAU.5.1
FIA_UAU.5.2
FIA_UAU.6 Re-authenticating
FIA_UAU.6.1
FIA_UAU.7 Protected authentication feedback <\/td>\n<\/tr>\n
82<\/td>\nFIA_UAU.7.1
User identification (FIA_UID)
Family Behaviour
Component levelling
Management of FIA_UID.1
Management of FIA_UID.2
Audit of FIA_UID.1, FIA_UID.2
FIA_UID.1 Timing of identification
FIA_UID.1.1
FIA_UID.1.2 <\/td>\n<\/tr>\n
83<\/td>\nFIA_UID.2 User identification before any action
FIA_UID.2.1
User-subject binding (FIA_USB)
Family Behaviour
Component levelling
Management of FIA_USB.1
Audit of FIA_USB.1
FIA_USB.1 User-subject binding
FIA_USB.1.1
FIA_USB.1.2 <\/td>\n<\/tr>\n
84<\/td>\nFIA_USB.1.3
Class FMT: Security management <\/td>\n<\/tr>\n
85<\/td>\nManagement of functions in TSF (FMT_MOF)
Family Behaviour
Component levelling
Management of FMT_MOF.1 <\/td>\n<\/tr>\n
86<\/td>\nAudit of FMT_MOF.1
FMT_MOF.1 Management of security functions behaviour
FMT_MOF.1.1
Management of security attributes (FMT_MSA)
Family Behaviour
Component levelling
Management of FMT_MSA.1
Management of FMT_MSA.2 <\/td>\n<\/tr>\n
87<\/td>\nManagement of FMT_MSA.3
Management of FMT_MSA.4
Audit of FMT_MSA.1
Audit of FMT_MSA.2
Audit of FMT_MSA.3
Audit of FMT_MSA.4
FMT_MSA.1 Management of security attributes <\/td>\n<\/tr>\n
88<\/td>\nFMT_MSA.1.1
FMT_MSA.2 Secure security attributes
FMT_MSA.2.1
FMT_MSA.3 Static attribute initialisation
FMT_MSA.3.1
FMT_MSA.3.2
FMT_MSA.4 Security attribute value inheritance
FMT_MSA.4.1 <\/td>\n<\/tr>\n
89<\/td>\nManagement of TSF data (FMT_MTD)
Family Behaviour
Component levelling
Management of FMT_MTD.1
Management of FMT_MTD.2
Management of FMT_MTD.3
Audit of FMT_MTD.1
Audit of FMT_MTD.2
Audit of FMT_MTD.3
FMT_MTD.1 Management of TSF data <\/td>\n<\/tr>\n
90<\/td>\nFMT_MTD.1.1
FMT_MTD.2 Management of limits on TSF data
FMT_MTD.2.1
FMT_MTD.2.2
FMT_MTD.3 Secure TSF data
FMT_MTD.3.1
Revocation (FMT_REV)
Family Behaviour
Component levelling
Management of FMT_REV.1 <\/td>\n<\/tr>\n
91<\/td>\nAudit of FMT_REV.1
FMT_REV.1 Revocation
FMT_REV.1.1
FMT_REV.1.2
Security attribute expiration (FMT_SAE)
Family Behaviour
Component levelling
Management of FMT_SAE.1
Audit of FMT_SAE.1
FMT_SAE.1 Time-limited authorisation <\/td>\n<\/tr>\n
92<\/td>\nFMT_SAE.1.1
FMT_SAE.1.2
Specification of Management Functions (FMT_SMF)
Family Behaviour
Component levelling
Management of FMT_SMF.1
Audit of FMT_SMF.1
FMT_SMF.1 Specification of Management Functions
FMT_SMF.1.1
Security management roles (FMT_SMR)
Family Behaviour <\/td>\n<\/tr>\n
93<\/td>\nComponent levelling
Management of FMT_SMR.1
Management of FMT_SMR.2
Management of FMT_SMR.3
Audit of FMT_SMR.1
Audit of FMT_SMR.2
Audit of FMT_SMR.3
FMT_SMR.1 Security roles <\/td>\n<\/tr>\n
94<\/td>\nFMT_SMR.1.1
FMT_SMR.1.2
FMT_SMR.2 Restrictions on security roles
FMT_SMR.2.1
FMT_SMR.2.2
FMT_SMR.2.3
FMT_SMR.3 Assuming roles
FMT_SMR.3.1 <\/td>\n<\/tr>\n
95<\/td>\nClass FPR: Privacy
Anonymity (FPR_ANO)
Family Behaviour
Component levelling
Management of FPR_ANO.1, FPR_ANO.2
Audit of FPR_ANO.1, FPR_ANO.2 <\/td>\n<\/tr>\n
96<\/td>\nFPR_ANO.1 Anonymity
FPR_ANO.1.1
FPR_ANO.2 Anonymity without soliciting information
FPR_ANO.2.1
FPR_ANO.2.2
Pseudonymity (FPR_PSE)
Family Behaviour
Component levelling
Management of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3
Audit of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3 <\/td>\n<\/tr>\n
97<\/td>\nFPR_PSE.1 Pseudonymity
FPR_PSE.1.1
FPR_PSE.1.2
FPR_PSE.1.3
FPR_PSE.2 Reversible pseudonymity
FPR_PSE.2.1
FPR_PSE.2.2
FPR_PSE.2.3
FPR_PSE.2.4
FPR_PSE.3 Alias pseudonymity
FPR_PSE.3.1 <\/td>\n<\/tr>\n
98<\/td>\nFPR_PSE.3.2
FPR_PSE.3.3
FPR_PSE.3.4
Unlinkability (FPR_UNL)
Family Behaviour
Component levelling
Management of FPR_UNL.1
Audit of FPR_UNL.1
FPR_UNL.1 Unlinkability
FPR_UNL.1.1
Unobservability (FPR_UNO)
Family Behaviour <\/td>\n<\/tr>\n
99<\/td>\nComponent levelling
Management of FPR_UNO.1, FPR_UNO.2
Management of FPR_UNO.3
Management of FPR_UNO.4
Audit of FPR_UNO.1, FPR_UNO.2
Audit of FPR_UNO.3
Audit of FPR_UNO.4
FPR_UNO.1 Unobservability <\/td>\n<\/tr>\n
100<\/td>\nFPR_UNO.1.1
FPR_UNO.2 Allocation of information impacting unobservabilit
FPR_UNO.2.1
FPR_UNO.2.2
FPR_UNO.3 Unobservability without soliciting information
FPR_UNO.3.1
FPR_UNO.4 Authorised user observability
FPR_UNO.4.1
Class FPT: Protection of the TSF <\/td>\n<\/tr>\n
101<\/td>\nFail secure (FPT_FLS)
Family Behaviour <\/td>\n<\/tr>\n
102<\/td>\nComponent levelling
Management of FPT_FLS.1
Audit of FPT_FLS.1
FPT_FLS.1 Failure with preservation of secure state
FPT_FLS.1.1
Availability of exported TSF data (FPT_ITA)
Family Behaviour
Component levelling
Management of FPT_ITA.1
Audit of FPT_ITA.1
FPT_ITA.1 Inter-TSF availability within a defined availabili <\/td>\n<\/tr>\n
103<\/td>\nFPT_ITA.1.1
Confidentiality of exported TSF data (FPT_ITC)
Family Behaviour
Component levelling
Management of FPT_ITC.1
Audit of FPT_ITC.1
FPT_ITC.1 Inter-TSF confidentiality during transmission
FPT_ITC.1.1
Integrity of exported TSF data (FPT_ITI)
Family Behaviour
Component levelling <\/td>\n<\/tr>\n
104<\/td>\nManagement of FPT_ITI.1
Management of FPT_ITI.2
Audit of FPT_ITI.1
Audit of FPT_ITI.2
FPT_ITI.1 Inter-TSF detection of modification
FPT_ITI.1.1
FPT_ITI.1.2
FPT_ITI.2 Inter-TSF detection and correction of modification <\/td>\n<\/tr>\n
105<\/td>\nFPT_ITI.2.1
FPT_ITI.2.2
FPT_ITI.2.3
Internal TOE TSF data transfer (FPT_ITT)
Family Behaviour
Component levelling
Management of FPT_ITT.1
Management of FPT_ITT.2
Management of FPT_ITT.3 <\/td>\n<\/tr>\n
106<\/td>\nAudit of FPT_ITT.1, FPT_ITT.2
Audit of FPT_ITT.3
FPT_ITT.1 Basic internal TSF data transfer protection
FPT_ITT.1.1
FPT_ITT.2 TSF data transfer separation
FPT_ITT.2.1
FPT_ITT.2.2
FPT_ITT.3 TSF data integrity monitoring
FPT_ITT.3.1 <\/td>\n<\/tr>\n
107<\/td>\nFPT_ITT.3.2
TSF physical protection (FPT_PHP)
Family Behaviour
Component levelling
Management of FPT_PHP.1
Management of FPT_PHP.2
Management of FPT_PHP.3
Audit of FPT_PHP.1 <\/td>\n<\/tr>\n
108<\/td>\nAudit of FPT_PHP.2
Audit of FPT_PHP.3
FPT_PHP.1 Passive detection of physical attack
FPT_PHP.1.1
FPT_PHP.1.2
FPT_PHP.2 Notification of physical attack
FPT_PHP.2.1
FPT_PHP.2.2
FPT_PHP.2.3
FPT_PHP.3 Resistance to physical attack
FPT_PHP.3.1 <\/td>\n<\/tr>\n
109<\/td>\nTrusted recovery (FPT_RCV)
Family Behaviour
Component levelling
Management of FPT_RCV.1
Management of FPT_RCV.2, FPT_RCV.3
Management of FPT_RCV.4
Audit of FPT_RCV.1, FPT_RCV.2, FPT_RCV.3
Audit of FPT_RCV.4 <\/td>\n<\/tr>\n
110<\/td>\nFPT_RCV.1 Manual recovery
FPT_RCV.1.1
FPT_RCV.2 Automated recovery
FPT_RCV.2.1
FPT_RCV.2.2
FPT_RCV.3 Automated recovery without undue loss
FPT_RCV.3.1
FPT_RCV.3.2
FPT_RCV.3.3
FPT_RCV.3.4 <\/td>\n<\/tr>\n
111<\/td>\nFPT_RCV.4 Function recovery
FPT_RCV.4.1
Replay detection (FPT_RPL)
Family Behaviour
Component levelling
Management of FPT_RPL.1
Audit of FPT_RPL.1
FPT_RPL.1 Replay detection
FPT_RPL.1.1
FPT_RPL.1.2 <\/td>\n<\/tr>\n
112<\/td>\nState synchrony protocol (FPT_SSP)
Family Behaviour
Component levelling
Management of FPT_SSP.1, FPT_SSP.2
Audit of FPT_SSP.1, FPT_SSP.2
FPT_SSP.1 Simple trusted acknowledgement
FPT_SSP.1.1
FPT_SSP.2 Mutual trusted acknowledgement
FPT_SSP.2.1
FPT_SSP.2.2 <\/td>\n<\/tr>\n
113<\/td>\nTime stamps (FPT_STM)
Family Behaviour
Component levelling
Management of FPT_STM.1
Audit of FPT_STM.1
FPT_STM.1 Reliable time stamps
FPT_STM.1.1
Inter-TSF TSF data consistency (FPT_TDC)
Family Behaviour
Component levelling
Management of FPT_TDC.1
Audit of FPT_TDC.1 <\/td>\n<\/tr>\n
114<\/td>\nFPT_TDC.1 Inter-TSF basic TSF data consistency
FPT_TDC.1.1
FPT_TDC.1.2
Testing of external entities (FPT_TEE)
Family Behaviour
Component levelling
Management of FPT_TEE.1
Audit of FPT_TEE.1
FPT_TEE.1 Testing of external entities <\/td>\n<\/tr>\n
115<\/td>\nFPT_TEE.1.1
FPT_TEE.1.2
Internal TOE TSF data replication consistency (FPT_TRC)
Family Behaviour
Component levelling
Management of FPT_TRC.1
Audit of FPT_TRC.1
FPT_TRC.1 Internal TSF consistency
FPT_TRC.1.1
FPT_TRC.1.2 <\/td>\n<\/tr>\n
116<\/td>\nTSF self test (FPT_TST)
Family Behaviour
Component levelling
Management of FPT_TST.1
Audit of FPT_TST.1
FPT_TST.1 TSF testing
FPT_TST.1.1
FPT_TST.1.2 <\/td>\n<\/tr>\n
117<\/td>\nFPT_TST.1.3
Class FRU: Resource utilisation
Fault tolerance (FRU_FLT)
Family Behaviour
Component levelling
Management of FRU_FLT.1, FRU_FLT.2
Audit of FRU_FLT.1
Audit of FRU_FLT.2 <\/td>\n<\/tr>\n
118<\/td>\nFRU_FLT.1 Degraded fault tolerance
FRU_FLT.1.1
FRU_FLT.2 Limited fault tolerance
FRU_FLT.2.1
Priority of service (FRU_PRS)
Family Behaviour
Component levelling
Management of FRU_PRS.1, FRU_PRS.2
Audit of FRU_PRS.1, FRU_PRS.2
FRU_PRS.1 Limited priority of service <\/td>\n<\/tr>\n
119<\/td>\nFRU_PRS.1.1
FRU_PRS.1.2
FRU_PRS.2 Full priority of service
FRU_PRS.2.1
FRU_PRS.2.2
Resource allocation (FRU_RSA)
Family Behaviour
Component levelling
Management of FRU_RSA.1
Management of FRU_RSA.2 <\/td>\n<\/tr>\n
120<\/td>\nAudit of FRU_RSA.1, FRU_RSA.2
FRU_RSA.1 Maximum quotas
FRU_RSA.1.1
FRU_RSA.2 Minimum and maximum quotas
FRU_RSA.2.1
FRU_RSA.2.2 <\/td>\n<\/tr>\n
121<\/td>\nClass FTA: TOE access
Limitation on scope of selectable attributes (FTA_LSA)
Family Behaviour
Component levelling
Management of FTA_LSA.1
Audit of FTA_LSA.1 <\/td>\n<\/tr>\n
122<\/td>\nFTA_LSA.1 Limitation on scope of selectable attributes
FTA_LSA.1.1
Limitation on multiple concurrent sessions (FTA_MCS)
Family Behaviour
Component levelling
Management of FTA_MCS.1
Management of FTA_MCS.2
Audit of FTA_MCS.1, FTA_MCS.2
FTA_MCS.1 Basic limitation on multiple concurrent sessions
FTA_MCS.1.1 <\/td>\n<\/tr>\n
123<\/td>\nFTA_MCS.1.2
FTA_MCS.2 Per user attribute limitation on multiple concurre
FTA_MCS.2.1
FTA_MCS.2.2
Session locking and termination (FTA_SSL)
Family Behaviour
Component levelling
Management of FTA_SSL.1
Management of FTA_SSL.2
Management of FTA_SSL.3 <\/td>\n<\/tr>\n
124<\/td>\nManagement of FTA_SSL.4
Audit of FTA_SSL.1, FTA_SSL.2
Audit of FTA_SSL.3
Audit of FTA_SSL.4
FTA_SSL.1 TSF-initiated session locking
FTA_SSL.1.1
FTA_SSL.1.2
FTA_SSL.2 User-initiated locking <\/td>\n<\/tr>\n
125<\/td>\nFTA_SSL.2.1
FTA_SSL.2.2
FTA_SSL.3 TSF-initiated termination
FTA_SSL.3.1
FTA_SSL.4 User-initiated termination
FTA_SSL.4.1
TOE access banners (FTA_TAB)
Family Behaviour
Component levelling
Management of FTA_TAB.1
Audit of FTA_TAB.1
FTA_TAB.1 Default TOE access banners <\/td>\n<\/tr>\n
126<\/td>\nFTA_TAB.1.1
TOE access history (FTA_TAH)
Family Behaviour
Component levelling
Management of FTA_TAH.1
Audit of FTA_TAH.1
FTA_TAH.1 TOE access history
FTA_TAH.1.1
FTA_TAH.1.2
FTA_TAH.1.3
TOE session establishment (FTA_TSE)
Family Behaviour
Component levelling <\/td>\n<\/tr>\n
127<\/td>\nManagement of FTA_TSE.1
Audit of FTA_TSE.1
FTA_TSE.1 TOE session establishment
FTA_TSE.1.1
Class FTP: Trusted path\/channels <\/td>\n<\/tr>\n
128<\/td>\nInter-TSF trusted channel (FTP_ITC)
Family Behaviour
Component levelling
Management of FTP_ITC.1
Audit of FTP_ITC.1
FTP_ITC.1 Inter-TSF trusted channel
FTP_ITC.1.1 <\/td>\n<\/tr>\n
129<\/td>\nFTP_ITC.1.2
FTP_ITC.1.3
Trusted path (FTP_TRP)
Family Behaviour
Component levelling
Management of FTP_TRP.1
Audit of FTP_TRP.1
FTP_TRP.1 Trusted path
FTP_TRP.1.1 <\/td>\n<\/tr>\n
130<\/td>\nFTP_TRP.1.2
FTP_TRP.1.3 <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Security techniques. Evaluation criteria for IT security – Security functional components<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2020<\/td>\n244<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":350599,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-350593","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/350593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/350599"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=350593"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=350593"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=350593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}