{"id":350593,"date":"2024-10-20T00:43:06","date_gmt":"2024-10-20T00:43:06","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-15408-22020\/"},"modified":"2024-10-26T00:30:52","modified_gmt":"2024-10-26T00:30:52","slug":"bs-en-iso-iec-15408-22020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-15408-22020\/","title":{"rendered":"BS EN ISO\/IEC 15408-2:2020"},"content":{"rendered":"
This part of ISO\/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common security functionality requirements of many IT products.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Scope Normative references Terms and definitions, symbols and abbreviated terms Overview Organisation of this part of ISO\/IEC 15408 <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Functional requirements paradigm <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Security functional components Overview Class structure <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Class name Class introduction Family structure Family name Family behaviour <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Component levelling Management Audit <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Component structure Component identification Functional elements Dependencies <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Component catalogue <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Component changes highlighting Class FAU: Security audit <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Security audit automatic response (FAU_ARP) Family Behaviour Component levelling Management of FAU_ARP.1 Audit of FAU_ARP.1 FAU_ARP.1 Security alarms FAU_ARP.1.1 Security audit data generation (FAU_GEN) Family Behaviour Component levelling Management of FAU_GEN.1, FAU_GEN.2 Audit of FAU_GEN.1, FAU_GEN.2 <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | FAU_GEN.1 Audit data generation FAU_GEN.1.1 FAU_GEN.1.2 FAU_GEN.2 User identity association FAU_GEN.2.1 Security audit analysis (FAU_SAA) Family Behaviour Component levelling <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Management of FAU_SAA.1 Management of FAU_SAA.2 Management of FAU_SAA.3 Management of FAU_SAA.4 Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4 FAU_SAA.1 Potential violation analysis <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | FAU_SAA.1.1 FAU_SAA.1.2 FAU_SAA.2 Profile based anomaly detection FAU_SAA.2.1 FAU_SAA.2.2 FAU_SAA.2.3 FAU_SAA.3 Simple attack heuristics FAU_SAA.3.1 FAU_SAA.3.2 FAU_SAA.3.3 <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | FAU_SAA.4 Complex attack heuristics FAU_SAA.4.1 FAU_SAA.4.2 FAU_SAA.4.3 Security audit review (FAU_SAR) Family Behaviour Component levelling Management of FAU_SAR.1 Management of FAU_SAR.2, FAU_SAR.3 Audit of FAU_SAR.1 <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Audit of FAU_SAR.2 Audit of FAU_SAR.3 FAU_SAR.1 Audit review FAU_SAR.1.1 FAU_SAR.1.2 FAU_SAR.2 Restricted audit review FAU_SAR.2.1 FAU_SAR.3 Selectable audit review FAU_SAR.3.1 Security audit event selection (FAU_SEL) Family Behaviour <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Component levelling Management of FAU_SEL.1 Audit of FAU_SEL.1 FAU_SEL.1 Selective audit FAU_SEL.1.1 Security audit event storage (FAU_STG) Family Behaviour Component levelling <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Management of FAU_STG.1 Management of FAU_STG.2 Management of FAU_STG.3 Management of FAU_STG.4 Audit of FAU_STG.1, FAU_STG.2 Audit of FAU_STG.3 Audit of FAU_STG.4 FAU_STG.1 Protected audit trail storage FAU_STG.1.1 FAU_STG.1.2 <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | FAU_STG.2 Guarantees of audit data availability FAU_STG.2.1 FAU_STG.2.2 FAU_STG.2.3 FAU_STG.3 Action in case of possible audit data loss FAU_STG.3.1 FAU_STG.4 Prevention of audit data loss FAU_STG.4.1 <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Class FCO: Communication Non-repudiation of origin (FCO_NRO) Family Behaviour Component levelling Management of FCO_NRO.1, FCO_NRO.2 Audit of FCO_NRO.1 <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Audit of FCO_NRO.2 FCO_NRO.1 Selective proof of origin FCO_NRO.1.1 FCO_NRO.1.2 FCO_NRO.1.3 FCO_NRO.2 Enforced proof of origin FCO_NRO.2.1 FCO_NRO.2.2 FCO_NRO.2.3 <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Non-repudiation of receipt (FCO_NRR) Family Behaviour Component levelling Management of FCO_NRR.1, FCO_NRR.2 Audit of FCO_NRR.1 Audit of FCO_NRR.2 FCO_NRR.1 Selective proof of receipt FCO_NRR.1.1 <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | FCO_NRR.1.2 FCO_NRR.1.3 FCO_NRR.2 Enforced proof of receipt FCO_NRR.2.1 FCO_NRR.2.2 FCO_NRR.2.3 <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Class FCS: Cryptographic support Cryptographic key management (FCS_CKM) Family Behaviour Component levelling <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Management of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4 Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.4 FCS_CKM.1 Cryptographic key generation FCS_CKM.1.1 FCS_CKM.2 Cryptographic key distribution FCS_CKM.2.1 FCS_CKM.3 Cryptographic key access <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | FCS_CKM.3.1 FCS_CKM.4 Cryptographic key destruction FCS_CKM.4.1 Cryptographic operation (FCS_COP) Family Behaviour Component levelling Management of FCS_COP.1 Audit of FCS_COP.1 <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | FCS_COP.1 Cryptographic operation FCS_COP.1.1 Class FDP: User data protection <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | Access control policy (FDP_ACC) Family Behaviour <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Component levelling Management of FDP_ACC.1, FDP_ACC.2 Audit of FDP_ACC.1, FDP_ACC.2 FDP_ACC.1 Subset access control FDP_ACC.1.1 FDP_ACC.2 Complete access control FDP_ACC.2.1 FDP_ACC.2.2 Access control functions (FDP_ACF) Family Behaviour Component levelling <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Management of FDP_ACF.1 Audit of FDP_ACF.1 FDP_ACF.1 Security attribute based access control FDP_ACF.1.1 FDP_ACF.1.2 FDP_ACF.1.3 FDP_ACF.1.4 <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Data authentication (FDP_DAU) Family Behaviour Component levelling Management of FDP_DAU.1, FDP_DAU.2 Audit of FDP_DAU.1 Audit of FDP_DAU.2 FDP_DAU.1 Basic Data Authentication FDP_DAU.1.1 <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | FDP_DAU.1.2 FDP_DAU.2 Data Authentication with Identity of Guarantor FDP_DAU.2.1 FDP_DAU.2.2 Export from the TOE (FDP_ETC) Family Behaviour Component levelling Management of FDP_ETC.1 Management of FDP_ETC.2 Audit of FDP_ETC.1, FDP_ETC.2 <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | FDP_ETC.1 Export of user data without security attributes FDP_ETC.1.1 FDP_ETC.1.2 FDP_ETC.2 Export of user data with security attributes FDP_ETC.2.1 FDP_ETC.2.2 FDP_ETC.2.3 FDP_ETC.2.4 Information flow control policy (FDP_IFC) Family Behaviour <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | Component levelling Management of FDP_IFC.1, FDP_IFC.2 Audit of FDP_IFC.1, FDP_IFC.2 FDP_IFC.1 Subset information flow control FDP_IFC.1.1 FDP_IFC.2 Complete information flow control FDP_IFC.2.1 FDP_IFC.2.2 Information flow control functions (FDP_IFF) Family Behaviour <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Component levelling Management of FDP_IFF.1, FDP_IFF.2 Management of FDP_IFF.3, FDP_IFF.4, FDP_IFF.5 Management of FDP_IFF.6 Audit of FDP_IFF.1, FDP_IFF.2, FDP_IFF.5 <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Audit of FDP_IFF.3, FDP_IFF.4, FDP_IFF.6 FDP_IFF.1 Simple security attributes FDP_IFF.1.1 FDP_IFF.1.2 FDP_IFF.1.3 FDP_IFF.1.4 FDP_IFF.1.5 FDP_IFF.2 Hierarchical security attributes <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | FDP_IFF.2.1 FDP_IFF.2.2 FDP_IFF.2.3 FDP_IFF.2.4 FDP_IFF.2.5 FDP_IFF.2.6 FDP_IFF.3 Limited illicit information flows FDP_IFF.3.1 <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | FDP_IFF.4 Partial elimination of illicit information flows FDP_IFF.4.1 FDP_IFF.4.2 FDP_IFF.5 No illicit information flows FDP_IFF.5.1 FDP_IFF.6 Illicit information flow monitoring FDP_IFF.6.1 Import from outside of the TOE (FDP_ITC) Family Behaviour Component levelling <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Management of FDP_ITC.1, FDP_ITC.2 Audit of FDP_ITC.1, FDP_ITC.2 FDP_ITC.1 Import of user data without security attributes FDP_ITC.1.1 FDP_ITC.1.2 FDP_ITC.1.3 FDP_ITC.2 Import of user data with security attributes <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | FDP_ITC.2.1 FDP_ITC.2.2 FDP_ITC.2.3 FDP_ITC.2.4 FDP_ITC.2.5 Internal TOE transfer (FDP_ITT) Family Behaviour Component levelling Management of FDP_ITT.1, FDP_ITT.2 <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Management of FDP_ITT.3, FDP_ITT.4 Audit of FDP_ITT.1, FDP_ITT.2 Audit of FDP_ITT.3, FDP_ITT.4 FDP_ITT.1 Basic internal transfer protection FDP_ITT.1.1 FDP_ITT.2 Transmission separation by attribute FDP_ITT.2.1 <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | FDP_ITT.2.2 FDP_ITT.3 Integrity monitoring FDP_ITT.3.1 FDP_ITT.3.2 FDP_ITT.4 Attribute-based integrity monitoring FDP_ITT.4.1 FDP_ITT.4.2 Residual information protection (FDP_RIP) Family Behaviour <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Component levelling Management of FDP_RIP.1, FDP_RIP.2 Audit of FDP_RIP.1, FDP_RIP.2 FDP_RIP.1 Subset residual information protection FDP_RIP.1.1 FDP_RIP.2 Full residual information protection FDP_RIP.2.1 Rollback (FDP_ROL) Family Behaviour Component levelling <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Management of FDP_ROL.1, FDP_ROL.2 Audit of FDP_ROL.1, FDP_ROL.2 FDP_ROL.1 Basic rollback FDP_ROL.1.1 FDP_ROL.1.2 FDP_ROL.2 Advanced rollback FDP_ROL.2.1 FDP_ROL.2.2 <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Stored data integrity (FDP_SDI) Family Behaviour Component levelling Management of FDP_SDI.1 Management of FDP_SDI.2 Audit of FDP_SDI.1 Audit of FDP_SDI.2 FDP_SDI.1 Stored data integrity monitoring <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | FDP_SDI.1.1 FDP_SDI.2 Stored data integrity monitoring and action FDP_SDI.2.1 FDP_SDI.2.2 Inter-TSF user data confidentiality transfer protection (FDP Family Behaviour Component levelling Management of FDP_UCT.1 Audit of FDP_UCT.1 FDP_UCT.1 Basic data exchange confidentiality <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | FDP_UCT.1.1 Inter-TSF user data integrity transfer protection (FDP_UIT) Family Behaviour Component levelling Management of FDP_UIT.1, FDP_UIT.2, FDP_UIT.3 Audit of FDP_UIT.1 Audit of FDP_UIT.2, FDP_UIT.3 <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | FDP_UIT.1 Data exchange integrity FDP_UIT.1.1 FDP_UIT.1.2 FDP_UIT.2 Source data exchange recovery FDP_UIT.2.1 FDP_UIT.3 Destination data exchange recovery <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | FDP_UIT.3.1 Class FIA: Identification and authentication <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Authentication failures (FIA_AFL) Family Behaviour Component levelling <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | Management of FIA_AFL.1 Audit of FIA_AFL.1 FIA_AFL.1 Authentication failure handling FIA_AFL.1.1 FIA_AFL.1.2 User attribute definition (FIA_ATD) Family Behaviour Component levelling Management of FIA_ATD.1 Audit of FIA_ATD.1 <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | FIA_ATD.1 User attribute definition FIA_ATD.1.1 Specification of secrets (FIA_SOS) Family Behaviour Component levelling Management of FIA_SOS.1 Management of FIA_SOS.2 Audit of FIA_SOS.1, FIA_SOS.2 FIA_SOS.1 Verification of secrets FIA_SOS.1.1 <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | FIA_SOS.2 TSF Generation of secrets FIA_SOS.2.1 FIA_SOS.2.2 User authentication (FIA_UAU) Family Behaviour Component levelling Management of FIA_UAU.1 <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Management of FIA_UAU.2 Management of FIA_UAU.3, FIA_UAU.4, FIA_UAU.7 Management of FIA_UAU.5 Management of FIA_UAU.6 Audit of FIA_UAU.1 Audit of FIA_UAU.2 Audit of FIA_UAU.3 <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | Audit of FIA_UAU.4 Audit of FIA_UAU.5 Audit of FIA_UAU.6 Audit of FIA_UAU.7 FIA_UAU.1 Timing of authentication FIA_UAU.1.1 FIA_UAU.1.2 FIA_UAU.2 User authentication before any action FIA_UAU.2.1 <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | FIA_UAU.3 Unforgeable authentication FIA_UAU.3.1 FIA_UAU.3.2 FIA_UAU.4 Single-use authentication mechanisms FIA_UAU.4.1 FIA_UAU.5 Multiple authentication mechanisms FIA_UAU.5.1 FIA_UAU.5.2 FIA_UAU.6 Re-authenticating FIA_UAU.6.1 FIA_UAU.7 Protected authentication feedback <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | FIA_UAU.7.1 User identification (FIA_UID) Family Behaviour Component levelling Management of FIA_UID.1 Management of FIA_UID.2 Audit of FIA_UID.1, FIA_UID.2 FIA_UID.1 Timing of identification FIA_UID.1.1 FIA_UID.1.2 <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | FIA_UID.2 User identification before any action FIA_UID.2.1 User-subject binding (FIA_USB) Family Behaviour Component levelling Management of FIA_USB.1 Audit of FIA_USB.1 FIA_USB.1 User-subject binding FIA_USB.1.1 FIA_USB.1.2 <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | FIA_USB.1.3 Class FMT: Security management <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Management of functions in TSF (FMT_MOF) Family Behaviour Component levelling Management of FMT_MOF.1 <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | Audit of FMT_MOF.1 FMT_MOF.1 Management of security functions behaviour FMT_MOF.1.1 Management of security attributes (FMT_MSA) Family Behaviour Component levelling Management of FMT_MSA.1 Management of FMT_MSA.2 <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Management of FMT_MSA.3 Management of FMT_MSA.4 Audit of FMT_MSA.1 Audit of FMT_MSA.2 Audit of FMT_MSA.3 Audit of FMT_MSA.4 FMT_MSA.1 Management of security attributes <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | FMT_MSA.1.1 FMT_MSA.2 Secure security attributes FMT_MSA.2.1 FMT_MSA.3 Static attribute initialisation FMT_MSA.3.1 FMT_MSA.3.2 FMT_MSA.4 Security attribute value inheritance FMT_MSA.4.1 <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | Management of TSF data (FMT_MTD) Family Behaviour Component levelling Management of FMT_MTD.1 Management of FMT_MTD.2 Management of FMT_MTD.3 Audit of FMT_MTD.1 Audit of FMT_MTD.2 Audit of FMT_MTD.3 FMT_MTD.1 Management of TSF data <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | FMT_MTD.1.1 FMT_MTD.2 Management of limits on TSF data FMT_MTD.2.1 FMT_MTD.2.2 FMT_MTD.3 Secure TSF data FMT_MTD.3.1 Revocation (FMT_REV) Family Behaviour Component levelling Management of FMT_REV.1 <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | Audit of FMT_REV.1 FMT_REV.1 Revocation FMT_REV.1.1 FMT_REV.1.2 Security attribute expiration (FMT_SAE) Family Behaviour Component levelling Management of FMT_SAE.1 Audit of FMT_SAE.1 FMT_SAE.1 Time-limited authorisation <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | FMT_SAE.1.1 FMT_SAE.1.2 Specification of Management Functions (FMT_SMF) Family Behaviour Component levelling Management of FMT_SMF.1 Audit of FMT_SMF.1 FMT_SMF.1 Specification of Management Functions FMT_SMF.1.1 Security management roles (FMT_SMR) Family Behaviour <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | Component levelling Management of FMT_SMR.1 Management of FMT_SMR.2 Management of FMT_SMR.3 Audit of FMT_SMR.1 Audit of FMT_SMR.2 Audit of FMT_SMR.3 FMT_SMR.1 Security roles <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | FMT_SMR.1.1 FMT_SMR.1.2 FMT_SMR.2 Restrictions on security roles FMT_SMR.2.1 FMT_SMR.2.2 FMT_SMR.2.3 FMT_SMR.3 Assuming roles FMT_SMR.3.1 <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | Class FPR: Privacy Anonymity (FPR_ANO) Family Behaviour Component levelling Management of FPR_ANO.1, FPR_ANO.2 Audit of FPR_ANO.1, FPR_ANO.2 <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | FPR_ANO.1 Anonymity FPR_ANO.1.1 FPR_ANO.2 Anonymity without soliciting information FPR_ANO.2.1 FPR_ANO.2.2 Pseudonymity (FPR_PSE) Family Behaviour Component levelling Management of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3 Audit of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3 <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | FPR_PSE.1 Pseudonymity FPR_PSE.1.1 FPR_PSE.1.2 FPR_PSE.1.3 FPR_PSE.2 Reversible pseudonymity FPR_PSE.2.1 FPR_PSE.2.2 FPR_PSE.2.3 FPR_PSE.2.4 FPR_PSE.3 Alias pseudonymity FPR_PSE.3.1 <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | FPR_PSE.3.2 FPR_PSE.3.3 FPR_PSE.3.4 Unlinkability (FPR_UNL) Family Behaviour Component levelling Management of FPR_UNL.1 Audit of FPR_UNL.1 FPR_UNL.1 Unlinkability FPR_UNL.1.1 Unobservability (FPR_UNO) Family Behaviour <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | Component levelling Management of FPR_UNO.1, FPR_UNO.2 Management of FPR_UNO.3 Management of FPR_UNO.4 Audit of FPR_UNO.1, FPR_UNO.2 Audit of FPR_UNO.3 Audit of FPR_UNO.4 FPR_UNO.1 Unobservability <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | FPR_UNO.1.1 FPR_UNO.2 Allocation of information impacting unobservabilit FPR_UNO.2.1 FPR_UNO.2.2 FPR_UNO.3 Unobservability without soliciting information FPR_UNO.3.1 FPR_UNO.4 Authorised user observability FPR_UNO.4.1 Class FPT: Protection of the TSF <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | Fail secure (FPT_FLS) Family Behaviour <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | Component levelling Management of FPT_FLS.1 Audit of FPT_FLS.1 FPT_FLS.1 Failure with preservation of secure state FPT_FLS.1.1 Availability of exported TSF data (FPT_ITA) Family Behaviour Component levelling Management of FPT_ITA.1 Audit of FPT_ITA.1 FPT_ITA.1 Inter-TSF availability within a defined availabili <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | FPT_ITA.1.1 Confidentiality of exported TSF data (FPT_ITC) Family Behaviour Component levelling Management of FPT_ITC.1 Audit of FPT_ITC.1 FPT_ITC.1 Inter-TSF confidentiality during transmission FPT_ITC.1.1 Integrity of exported TSF data (FPT_ITI) Family Behaviour Component levelling <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Management of FPT_ITI.1 Management of FPT_ITI.2 Audit of FPT_ITI.1 Audit of FPT_ITI.2 FPT_ITI.1 Inter-TSF detection of modification FPT_ITI.1.1 FPT_ITI.1.2 FPT_ITI.2 Inter-TSF detection and correction of modification <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | FPT_ITI.2.1 FPT_ITI.2.2 FPT_ITI.2.3 Internal TOE TSF data transfer (FPT_ITT) Family Behaviour Component levelling Management of FPT_ITT.1 Management of FPT_ITT.2 Management of FPT_ITT.3 <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | Audit of FPT_ITT.1, FPT_ITT.2 Audit of FPT_ITT.3 FPT_ITT.1 Basic internal TSF data transfer protection FPT_ITT.1.1 FPT_ITT.2 TSF data transfer separation FPT_ITT.2.1 FPT_ITT.2.2 FPT_ITT.3 TSF data integrity monitoring FPT_ITT.3.1 <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | FPT_ITT.3.2 TSF physical protection (FPT_PHP) Family Behaviour Component levelling Management of FPT_PHP.1 Management of FPT_PHP.2 Management of FPT_PHP.3 Audit of FPT_PHP.1 <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | Audit of FPT_PHP.2 Audit of FPT_PHP.3 FPT_PHP.1 Passive detection of physical attack FPT_PHP.1.1 FPT_PHP.1.2 FPT_PHP.2 Notification of physical attack FPT_PHP.2.1 FPT_PHP.2.2 FPT_PHP.2.3 FPT_PHP.3 Resistance to physical attack FPT_PHP.3.1 <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | Trusted recovery (FPT_RCV) Family Behaviour Component levelling Management of FPT_RCV.1 Management of FPT_RCV.2, FPT_RCV.3 Management of FPT_RCV.4 Audit of FPT_RCV.1, FPT_RCV.2, FPT_RCV.3 Audit of FPT_RCV.4 <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | FPT_RCV.1 Manual recovery FPT_RCV.1.1 FPT_RCV.2 Automated recovery FPT_RCV.2.1 FPT_RCV.2.2 FPT_RCV.3 Automated recovery without undue loss FPT_RCV.3.1 FPT_RCV.3.2 FPT_RCV.3.3 FPT_RCV.3.4 <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | FPT_RCV.4 Function recovery FPT_RCV.4.1 Replay detection (FPT_RPL) Family Behaviour Component levelling Management of FPT_RPL.1 Audit of FPT_RPL.1 FPT_RPL.1 Replay detection FPT_RPL.1.1 FPT_RPL.1.2 <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | State synchrony protocol (FPT_SSP) Family Behaviour Component levelling Management of FPT_SSP.1, FPT_SSP.2 Audit of FPT_SSP.1, FPT_SSP.2 FPT_SSP.1 Simple trusted acknowledgement FPT_SSP.1.1 FPT_SSP.2 Mutual trusted acknowledgement FPT_SSP.2.1 FPT_SSP.2.2 <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | Time stamps (FPT_STM) Family Behaviour Component levelling Management of FPT_STM.1 Audit of FPT_STM.1 FPT_STM.1 Reliable time stamps FPT_STM.1.1 Inter-TSF TSF data consistency (FPT_TDC) Family Behaviour Component levelling Management of FPT_TDC.1 Audit of FPT_TDC.1 <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | FPT_TDC.1 Inter-TSF basic TSF data consistency FPT_TDC.1.1 FPT_TDC.1.2 Testing of external entities (FPT_TEE) Family Behaviour Component levelling Management of FPT_TEE.1 Audit of FPT_TEE.1 FPT_TEE.1 Testing of external entities <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | FPT_TEE.1.1 FPT_TEE.1.2 Internal TOE TSF data replication consistency (FPT_TRC) Family Behaviour Component levelling Management of FPT_TRC.1 Audit of FPT_TRC.1 FPT_TRC.1 Internal TSF consistency FPT_TRC.1.1 FPT_TRC.1.2 <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | TSF self test (FPT_TST) Family Behaviour Component levelling Management of FPT_TST.1 Audit of FPT_TST.1 FPT_TST.1 TSF testing FPT_TST.1.1 FPT_TST.1.2 <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | FPT_TST.1.3 Class FRU: Resource utilisation Fault tolerance (FRU_FLT) Family Behaviour Component levelling Management of FRU_FLT.1, FRU_FLT.2 Audit of FRU_FLT.1 Audit of FRU_FLT.2 <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | FRU_FLT.1 Degraded fault tolerance FRU_FLT.1.1 FRU_FLT.2 Limited fault tolerance FRU_FLT.2.1 Priority of service (FRU_PRS) Family Behaviour Component levelling Management of FRU_PRS.1, FRU_PRS.2 Audit of FRU_PRS.1, FRU_PRS.2 FRU_PRS.1 Limited priority of service <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | FRU_PRS.1.1 FRU_PRS.1.2 FRU_PRS.2 Full priority of service FRU_PRS.2.1 FRU_PRS.2.2 Resource allocation (FRU_RSA) Family Behaviour Component levelling Management of FRU_RSA.1 Management of FRU_RSA.2 <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | Audit of FRU_RSA.1, FRU_RSA.2 FRU_RSA.1 Maximum quotas FRU_RSA.1.1 FRU_RSA.2 Minimum and maximum quotas FRU_RSA.2.1 FRU_RSA.2.2 <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | Class FTA: TOE access Limitation on scope of selectable attributes (FTA_LSA) Family Behaviour Component levelling Management of FTA_LSA.1 Audit of FTA_LSA.1 <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | FTA_LSA.1 Limitation on scope of selectable attributes FTA_LSA.1.1 Limitation on multiple concurrent sessions (FTA_MCS) Family Behaviour Component levelling Management of FTA_MCS.1 Management of FTA_MCS.2 Audit of FTA_MCS.1, FTA_MCS.2 FTA_MCS.1 Basic limitation on multiple concurrent sessions FTA_MCS.1.1 <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | FTA_MCS.1.2 FTA_MCS.2 Per user attribute limitation on multiple concurre FTA_MCS.2.1 FTA_MCS.2.2 Session locking and termination (FTA_SSL) Family Behaviour Component levelling Management of FTA_SSL.1 Management of FTA_SSL.2 Management of FTA_SSL.3 <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | Management of FTA_SSL.4 Audit of FTA_SSL.1, FTA_SSL.2 Audit of FTA_SSL.3 Audit of FTA_SSL.4 FTA_SSL.1 TSF-initiated session locking FTA_SSL.1.1 FTA_SSL.1.2 FTA_SSL.2 User-initiated locking <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | FTA_SSL.2.1 FTA_SSL.2.2 FTA_SSL.3 TSF-initiated termination FTA_SSL.3.1 FTA_SSL.4 User-initiated termination FTA_SSL.4.1 TOE access banners (FTA_TAB) Family Behaviour Component levelling Management of FTA_TAB.1 Audit of FTA_TAB.1 FTA_TAB.1 Default TOE access banners <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | FTA_TAB.1.1 TOE access history (FTA_TAH) Family Behaviour Component levelling Management of FTA_TAH.1 Audit of FTA_TAH.1 FTA_TAH.1 TOE access history FTA_TAH.1.1 FTA_TAH.1.2 FTA_TAH.1.3 TOE session establishment (FTA_TSE) Family Behaviour Component levelling <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | Management of FTA_TSE.1 Audit of FTA_TSE.1 FTA_TSE.1 TOE session establishment FTA_TSE.1.1 Class FTP: Trusted path\/channels <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | Inter-TSF trusted channel (FTP_ITC) Family Behaviour Component levelling Management of FTP_ITC.1 Audit of FTP_ITC.1 FTP_ITC.1 Inter-TSF trusted channel FTP_ITC.1.1 <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | FTP_ITC.1.2 FTP_ITC.1.3 Trusted path (FTP_TRP) Family Behaviour Component levelling Management of FTP_TRP.1 Audit of FTP_TRP.1 FTP_TRP.1 Trusted path FTP_TRP.1.1 <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | FTP_TRP.1.2 FTP_TRP.1.3 <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Security techniques. Evaluation criteria for IT security – Security functional components<\/b><\/p>\n |