Shopping Cart

No products in the cart.

BS EN ISO/IEC 15408-2:2023

$215.11

Information security, cybersecurity and privacy protection. Evaluation criteria for IT security – Security functional components

Published By Publication Date Number of Pages
BSI 2023 294
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 undefined
24 5.1 General
5.2 Organization of this document
29 7.1 Overview
7.1.1 General
7.1.2 Class structure
30 7.1.3 Family structure
31 7.1.4 Component structure
33 7.2 Component catalogue
34 8.1 Class description
35 8.2 Security audit automatic response (FAU_ARP)
8.2.1 Family behaviour
8.2.2 Components leveling and description
8.2.3 Management of FAU_ARP.1
8.2.4 Audit of FAU_ARP.1
8.2.5 FAU_ARP.1 Security alarms
8.3 Security audit data generation (FAU_GEN)
8.3.1 Family behaviour
8.3.2 Components leveling and description
36 8.3.3 Management of FAU_GEN.1, FAU_GEN.2
8.3.4 Audit of FAU_GEN.1, FAU_GEN.2
8.3.5 FAU_GEN.1 Audit data generation
8.3.6 FAU_GEN.2 User identity association
37 8.4 Security audit analysis (FAU_SAA)
8.4.1 Family behaviour
8.4.2 Components leveling and description
8.4.3 Management of FAU_SAA.1
38 8.4.4 Management of FAU_SAA.2
8.4.5 Management of FAU_SAA.3
8.4.6 Management of FAU_SAA.4
8.4.7 Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4
8.4.8 FAU_SAA.1 Potential violation analysis
8.4.9 FAU_SAA.2 Profile based anomaly detection
39 8.4.10 FAU_SAA.3 Simple attack heuristics
8.4.11 FAU_SAA.4 Complex attack heuristics
40 8.5 Security audit review (FAU_SAR)
8.5.1 Family behaviour
8.5.2 Components leveling and description
8.5.3 Management of FAU_SAR.1
8.5.4 Management of FAU_SAR.2, FAU_SAR.3
8.5.5 Audit of FAU_SAR.1
41 8.5.6 Audit of FAU_SAR.2
8.5.7 Audit of FAU_SAR.3
8.5.8 FAU_SAR.1 Audit review
8.5.9 FAU_SAR.2 Restricted audit review
8.5.10 FAU_SAR.3 Selectable audit review
42 8.6 Security audit event selection (FAU_SEL)
8.6.1 Family behaviour
8.6.2 Components leveling and description
8.6.3 Management of FAU_SEL.1
8.6.4 Audit of FAU_SEL.1
8.6.5 FAU_SEL.1 Selective audit
8.7 Security audit data storage (FAU_STG)
8.7.1 Family behaviour
43 8.7.2 Components leveling and description
8.7.3 Management of FAU_STG.1
8.7.4 Management of FAU_STG.2
8.7.5 Management of FAU_STG.3
8.7.6 Management of FAU_STG.4
8.7.7 Management of FAU_STG.5
44 8.7.8 Audit of FAU_STG.1
8.7.9 Audit of FAU_STG.2, FAU_STG.3
8.7.10 Audit of FAU_STG.4
8.7.11 Audit of FAU_STG.5
8.7.12 FAU_STG.1 Audit data storage location
8.7.13 FAU_STG.2 Protected audit data storage
45 8.7.14 FAU_STG.3 Guarantees of audit data availability
8.7.15 FAU_STG.4 Action in case of possible audit data loss
8.7.16 FAU_STG.5 Prevention of audit data loss
9.1 Class description
46 9.2 Non-repudiation of origin (FCO_NRO)
9.2.1 Family behaviour
9.2.2 Components leveling and description
9.2.3 Management of FCO_NRO.1, FCO_NRO.2
9.2.4 Audit of FCO_NRO.1
47 9.2.5 Audit of FCO_NRO.2
9.2.6 FCO_NRO.1 Selective proof of origin
9.2.7 FCO_NRO.2 Enforced proof of origin
48 9.3 Non-repudiation of receipt (FCO_NRR)
9.3.1 Family behaviour
9.3.2 Components leveling and description
9.3.3 Management of FCO_NRR.1, FCO_NRR.2
9.3.4 Audit of FCO_NRR.1
9.3.5 Audit of FCO_NRR.2
49 9.3.6 FCO_NRR.1 Selective proof of receipt
9.3.7 FCO_NRR.2 Enforced proof of receipt
10.1 Class description
50 10.2 Cryptographic key management (FCS_CKM)
10.2.1 Family behaviour
10.2.2 Components leveling and description
51 10.2.3 Management of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6
10.2.4 Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6
10.2.5 FCS_CKM.1 Cryptographic key generation
52 10.2.6 FCS_CKM.2 Cryptographic key distribution
10.2.7 FCS_CKM.3 Cryptographic key access
10.2.8 FCS_CKM.4 Cryptographic key destruction
53 10.2.9 FCS_CKM.5 Cryptographic key derivation
10.2.10 FCS_CKM.6 Timing and event of cryptographic key destruction
10.3 Cryptographic operation (FCS_COP)
10.3.1 Family behaviour
10.3.2 Components leveling and description
54 10.3.3 Management of FCS_COP.1
10.3.4 Audit of FCS_COP.1
10.3.5 FCS_COP.1 Cryptographic operation
10.4 Random bit generation (FCS_RBG)
10.4.1 Family behaviour
10.4.2 Components leveling and description
55 10.4.3 Management of FCS_RBG.1, FCS_RBG.2, FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RBG.6
10.4.4 Audit of FCS_RBG.1, FCS_RBG.2
10.4.5 Audit of FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RBG.6
10.4.6 FCS_RBG.1 Random bit generation (RBG)
56 10.4.7 FCS_RBG.2 Random bit generation (external seeding)
10.4.8 FCS_RBG.3 Random bit generation (internal seeding – single source)
57 10.4.9 FCS_RBG.4 Random bit generation (internal seeding – multiple sources)
10.4.10 FCS_RBG.5 Random bit generation (combining noise sources)
10.4.11 FCS_RBG.6 Random bit generation service
10.5 Generation of random numbers (FCS_RNG)
10.5.1 Family behaviour
58 10.5.2 Components leveling and description
10.5.3 Management of FCS_RNG.1
10.5.4 Audit of FCS_RNG.1
10.5.5 FCS_RNG.1 Random number generation
11.1 Class description
60 11.2 Access control policy (FDP_ACC)
11.2.1 Family behaviour
61 11.2.2 Components leveling and description
11.2.3 Management of FDP_ACC.1, FDP_ACC.2
11.2.4 Audit of FDP_ACC.1, FDP_ACC.2
11.2.5 FDP_ACC.1 Subset access control
11.2.6 FDP_ACC.2 Complete access control
62 11.3 Access control functions (FDP_ACF)
11.3.1 Family behaviour
11.3.2 Components leveling and description
11.3.3 Management of FDP_ACF.1
11.3.4 Audit of FDP_ACF.1
11.3.5 FDP_ACF.1 Security attribute-based access control
63 11.4 Data authentication (FDP_DAU)
11.4.1 Family behaviour
11.4.2 Components leveling and description
11.4.3 Management of FDP_DAU.1, FDP_DAU.2
11.4.4 Audit of FDP_DAU.1
64 11.4.5 Audit of FDP_DAU.2
11.4.6 FDP_DAU.1 Basic Data Authentication
11.4.7 FDP_DAU.2 Data Authentication with Identity of Guarantor
11.5 Export from the TOE (FDP_ETC)
11.5.1 Family behaviour
65 11.5.2 Components leveling and description
11.5.3 Management of FDP_ETC.1
11.5.4 Management of FDP_ETC.2
11.5.5 Audit of FDP_ETC.1, FDP_ETC.2
11.5.6 FDP_ETC.1 Export of user data without security attributes
11.5.7 FDP_ETC.2 Export of user data with security attributes
66 11.6 Information flow control policy (FDP_IFC)
11.6.1 Family behaviour
11.6.2 Components leveling and description
67 11.6.3 Management of FDP_IFC.1, FDP_IFC.2
11.6.4 Audit of FDP_IFC.1, FDP_IFC.2
11.6.5 FDP_IFC.1 Subset information flow control
11.6.6 FDP_IFC.2 Complete information flow control
11.7 Information flow control functions (FDP_IFF)
11.7.1 Family behaviour
68 11.7.2 Components leveling and description
11.7.3 Management of FDP_IFF.1, FDP_IFF.2
11.7.4 Management of FDP_IFF.3, FDP_IFF.4, FDP_IFF.5
69 11.7.5 Management of FDP_IFF.6
11.7.6 Audit of FDP_IFF.1, FDP_IFF.2, FDP_IFF.5
11.7.7 Audit of FDP_IFF.3, FDP_IFF.4, FDP_IFF.6
11.7.8 FDP_IFF.1 Simple security attributes
70 11.7.9 FDP_IFF.2 Hierarchical security attributes
71 11.7.10 FDP_IFF.3 Limited illicit information flows
11.7.11 FDP_IFF.4 Partial elimination of illicit information flows
11.7.12 FDP_IFF.5 No illicit information flows
11.7.13 FDP_IFF.6 Illicit information flow monitoring
72 11.8 Information Retention Control (FDP_IRC)
11.8.1 Family behaviour
11.8.2 Components leveling and description
73 11.8.3 Management of FDP_IRC.1
11.8.4 Audit of FDP_IRC.1
11.8.5 FDP_IRC.1 Information retention control
11.9 Import from outside of the TOE (FDP_ITC)
11.9.1 Family behaviour
11.9.2 Components leveling and description
74 11.9.3 Management of FDP_ITC.1, FDP_ITC.2
11.9.4 Audit of FDP_ITC.1, FDP_ITC.2
11.9.5 FDP_ITC.1 Import of user data without security attributes
11.9.6 FDP_ITC.2 Import of user data with security attributes
75 11.10 Internal TOE transfer (FDP_ITT)
11.10.1 Family behaviour
11.10.2 Components leveling and description
11.10.3 Management of FDP_ITT.1, FDP_ITT.2
76 11.10.4 Management of FDP_ITT.3, FDP_ITT.4
11.10.5 Audit of FDP_ITT.1, FDP_ITT.2
11.10.6 Audit of FDP_ITT.3, FDP_ITT.4
11.10.7 FDP_ITT.1 Basic internal transfer protection
11.10.8 FDP_ITT.2 Transmission separation by attribute
77 11.10.9 FDP_ITT.3 Integrity monitoring
11.10.10 FDP_ITT.4 Attribute-based integrity monitoring
11.11 Residual information protection (FDP_RIP)
11.11.1 Family behaviour
78 11.11.2 Components leveling and description
11.11.3 Management of FDP_RIP.1, FDP_RIP.2
11.11.4 Audit of FDP_RIP.1, FDP_RIP.2
11.11.5 FDP_RIP.1 Subset residual information protection
11.11.6 FDP_RIP.2 Full residual information protection
79 11.12 Rollback (FDP_ROL)
11.12.1 Family behaviour
11.12.2 Components leveling and description
11.12.3 Management of FDP_ROL.1, FDP_ROL.2
11.12.4 Audit of FDP_ROL.1, FDP_ROL.2
11.12.5 FDP_ROL.1 Basic rollback
80 11.12.6 FDP_ROL.2 Advanced rollback
11.13 Stored data confidentiality (FDP_SDC)
11.13.1 Family behaviour
11.13.2 Components leveling and description
11.13.3 Management of FDP_SDC.1, FDP_SDC.2
81 11.13.4 Audit of FDP_SDC.1, FDP_SDC.2
11.13.5 FDP_SDC.1 Stored data confidentiality
11.13.6 FDP_SDC.2 Stored data confidentiality with dedicated method
11.14 Stored data integrity (FDP_SDI)
11.14.1 Family behaviour
11.14.2 Components leveling and description
82 11.14.3 Management of FDP_SDI.1
11.14.4 Management of FDP_SDI.2
11.14.5 Audit of FDP_SDI.1
11.14.6 Audit of FDP_SDI.2
11.14.7 FDP_SDI.1 Stored data integrity monitoring
11.14.8 FDP_SDI.2 Stored data integrity monitoring and action
83 11.15 Inter-TSF user data confidentiality transfer protection (FDP_UCT)
11.15.1 Family behaviour
11.15.2 Components leveling and description
11.15.3 Management of FDP_UCT.1
11.15.4 Audit of FDP_UCT.1
11.15.5 FDP_UCT.1 Basic data exchange confidentiality
84 11.16 Inter-TSF user data integrity transfer protection (FDP_UIT)
11.16.1 Family behaviour
11.16.2 Components leveling and description
11.16.3 Management of FDP_UIT.1, FDP_UIT.2, FDP_UIT.3
11.16.4 Audit of FDP_UIT.1
85 11.16.5 Audit of FDP_UIT.2, FDP_UIT.3
11.16.6 FDP_UIT.1 Data exchange integrity
11.16.7 FDP_UIT.2 Source data exchange recovery
86 11.16.8 FDP_UIT.3 Destination data exchange recovery
12.1 Class description
87 12.2 Authentication failures (FIA_AFL)
12.2.1 Family behaviour
12.2.2 Components leveling and description
88 12.2.3 Management of FIA_AFL.1
12.2.4 Audit of FIA_AFL.1
12.2.5 FIA_AFL.1 Authentication failure handling
12.3 Authentication proof of identity (FIA_API)
12.3.1 Family behaviour
12.3.2 Components leveling and description
12.3.3 Management of FIA_API.1
89 12.3.4 Audit of FIA_API.1
12.3.5 FIA_API.1 Authentication proof of identity
12.4 User attribute definition (FIA_ATD)
12.4.1 Family behaviour
12.4.2 Components leveling and description
12.4.3 Management of FIA_ATD.1
12.4.4 Audit of FIA_ATD.1
12.4.5 FIA_ATD.1 User attribute definition
90 12.5 Specification of secrets (FIA_SOS)
12.5.1 Family behaviour
12.5.2 Components leveling and description
12.5.3 Management of FIA_SOS.1
12.5.4 Management of FIA_SOS.2
12.5.5 Audit of FIA_SOS.1, FIA_SOS.2
12.5.6 FIA_SOS.1 Verification of secrets
91 12.5.7 FIA_SOS.2 TSF Generation of secrets
12.6 User authentication (FIA_UAU)
12.6.1 Family behaviour
12.6.2 Components leveling and description
92 12.6.3 Management of FIA_UAU.1
12.6.4 Management of FIA_UAU.2
12.6.5 Management of FIA_UAU.3, FIA_UAU.4, FIA_UAU.7
12.6.6 Management of FIA_UAU.5
12.6.7 Management of FIA_UAU.6
12.6.8 Management of FIA_UAU.7
12.6.9 Audit of FIA_UAU.1
93 12.6.10 Audit of FIA_UAU.2
12.6.11 Audit of FIA_UAU.3
12.6.12 Audit of FIA_UAU.4
12.6.13 Audit of FIA_UAU.5
12.6.14 Audit of FIA_UAU.6
12.6.15 Audit of FIA_UAU.7
12.6.16 FIA_UAU.1 Timing of authentication
94 12.6.17 FIA_UAU.2 User authentication before any action
12.6.18 FIA_UAU.3 Unforgeable authentication
12.6.19 FIA_UAU.4 Single-use authentication mechanisms
12.6.20 FIA_UAU.5 Multiple authentication mechanisms
95 12.6.21 FIA_UAU.6 Re-authenticating
12.6.22 FIA_UAU.7 Protected authentication feedback
12.7 User identification (FIA_UID)
12.7.1 Family behaviour
12.7.2 Components leveling and description
96 12.7.3 Management of FIA_UID.1
12.7.4 Management of FIA_UID.2
12.7.5 Audit of FIA_UID.1, FIA_UID.2
12.7.6 FIA_UID.1 Timing of identification
12.7.7 FIA_UID.2 User identification before any action
97 12.8 User-subject binding (FIA_USB)
12.8.1 Family behaviour
12.8.2 Components leveling and description
12.8.3 Management of FIA_USB.1
12.8.4 Audit of FIA_USB.1
12.8.5 FIA_USB.1 User-subject binding
98 13.1 Class description
99 13.2 Limited capabilities and availability (FMT_LIM)
13.2.1 Family behaviour
13.2.2 Components leveling and description
100 13.2.3 Management of FMT_LIM.1, FMT_LIM.2
13.2.4 Audit of FMT_LIM.1
13.2.5 FMT_LIM.1 Limited capabilities
13.2.6 FMT_LIM.2 Limited availability
13.3 Management of functions in TSF (FMT_MOF)
13.3.1 Family behaviour
13.3.2 Components leveling and description
101 13.3.3 Management of FMT_MOF.1
13.3.4 Audit of FMT_MOF.1
13.3.5 FMT_MOF.1 Management of security functions behaviour
13.4 Management of security attributes (FMT_MSA)
13.4.1 Family behaviour
13.4.2 Components leveling and description
102 13.4.3 Management of FMT_MSA.1
13.4.4 Management of FMT_MSA.2
13.4.5 Management of FMT_MSA.3
13.4.6 Management of FMT_MSA.4
13.4.7 Audit of FMT_MSA.1
13.4.8 Audit of FMT_MSA.2
13.4.9 Audit of FMT_MSA.3
103 13.4.10 Audit of FMT_MSA.4
13.4.11 FMT_MSA.1 Management of security attributes
13.4.12 FMT_MSA.2 Secure security attributes
13.4.13 FMT_MSA.3 Static attribute initialization
104 13.4.14 FMT_MSA.4 Security attribute value inheritance
13.5 Management of TSF data (FMT_MTD)
13.5.1 Family behaviour
13.5.2 Components leveling and description
13.5.3 Management of FMT_MTD.1
13.5.4 Management of FMT_MTD.2
105 13.5.5 Management of FMT_MTD.3
13.5.6 Audit of FMT_MTD.1
13.5.7 Audit of FMT_MTD.2
13.5.8 Audit of FMT_MTD.3
13.5.9 FMT_MTD.1 Management of TSF data
13.5.10 FMT_MTD.2 Management of limits on TSF data
106 13.5.11 FMT_MTD.3 Secure TSF data
13.6 Revocation (FMT_REV)
13.6.1 Family behaviour
13.6.2 Components leveling and description
13.6.3 Management of FMT_REV.1
13.6.4 Audit of FMT_REV.1
13.6.5 FMT_REV.1 Revocation
107 13.7 Security attribute expiration (FMT_SAE)
13.7.1 Family behaviour
13.7.2 Components leveling and description
13.7.3 Management of FMT_SAE.1
13.7.4 Audit of FMT_SAE.1
13.7.5 FMT_SAE.1 Time-limited authorization
108 13.8 Specification of Management Functions (FMT_SMF)
13.8.1 Family behaviour
13.8.2 Components leveling and description
13.8.3 Management of FMT_SMF.1
13.8.4 Audit of FMT_SMF.1
13.8.5 FMT_SMF.1 Specification of Management Functions
109 13.9 Security management roles (FMT_SMR)
13.9.1 Family behaviour
13.9.2 Components leveling and description
13.9.3 Management of FMT_SMR.1
13.9.4 Management of FMT_SMR.2
13.9.5 Management of FMT_SMR.3
13.9.6 Audit of FMT_SMR.1
13.9.7 Audit of FMT_SMR.2
110 13.9.8 Audit of FMT_SMR.3
13.9.9 FMT_SMR.1 Security roles
13.9.10 FMT_SMR.2 Restrictions on security roles
13.9.11 FMT_SMR.3 Assuming roles
111 14.1 Class description
14.2 Anonymity (FPR_ANO)
14.2.1 Family behaviour
14.2.2 Components leveling and description
112 14.2.3 Management of FPR_ANO.1, FPR_ANO.2
14.2.4 Audit of FPR_ANO.1, FPR_ANO.2
14.2.5 FPR_ANO.1 Anonymity
14.2.6 FPR_ANO.2 Anonymity without soliciting information
14.3 Pseudonymity (FPR_PSE)
14.3.1 Family behaviour
14.3.2 Components leveling and description
113 14.3.3 Management of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3
14.3.4 Audit of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3
14.3.5 FPR_PSE.1 Pseudonymity
14.3.6 FPR_PSE.2 Reversible pseudonymity
114 14.3.7 FPR_PSE.3 Alias pseudonymity
14.4 Unlinkability (FPR_UNL)
14.4.1 Family behaviour
14.4.2 Components leveling and description
115 14.4.3 Management of FPR_UNL.1
14.4.4 Audit of FPR_UNL.1
14.4.5 FPR_UNL.1 Unlinkability of operations
14.5 Unobservability (FPR_UNO)
14.5.1 Family behaviour
14.5.2 Components leveling and description
116 14.5.3 Management of FPR_UNO.1, FPR_UNO.2
14.5.4 Management of FPR_UNO.3
14.5.5 Management of FPR_UNO.4
14.5.6 Audit of FPR_UNO.1, FPR_UNO.2
14.5.7 Audit of FPR_UNO.3
14.5.8 Audit of FPR_UNO.4
117 14.5.9 FPR_UNO.1 Unobservability
14.5.10 FPR_UNO.2 Allocation of information impacting unobservability
14.5.11 FPR_UNO.3 Unobservability without soliciting information
14.5.12 FPR_UNO.4 Authorized user observability
118 15.1 Class description
120 15.2 TOE emanation (FPT_EMS)
15.2.1 Family behaviour
121 15.2.2 Components leveling and description
15.2.3 Management of FPT_EMS.1
15.2.4 Audit of FPT_EMS.1
15.2.5 FPT_EMS.1 Emanation of TSF and User data
15.3 Fail secure (FPT_FLS)
15.3.1 Family behaviour
122 15.3.2 Components leveling and description
15.3.3 Management of FPT_FLS.1
15.3.4 Audit of FPT_FLS.1
15.3.5 FPT_FLS.1 Failure with preservation of secure state
15.4 TSF initialization (FPT_INI)
15.4.1 Family behaviour
15.4.2 Components leveling and description
123 15.4.3 Management of FPT_INI.1
15.4.4 Audit of FPT_INI.1
15.4.5 FPT_INI.1 TSF initialization
15.5 Availability of exported TSF data (FPT_ITA)
15.5.1 Family behaviour
15.5.2 Components leveling and description
124 15.5.3 Management of FPT_ITA.1
15.5.4 Audit of FPT_ITA.1
15.5.5 FPT_ITA.1 Inter-TSF availability within a defined availability metric
15.6 Confidentiality of exported TSF data (FPT_ITC)
15.6.1 Family behaviour
15.6.2 Components leveling and description
125 15.6.3 Management of FPT_ITC.1
15.6.4 Audit of FPT_ITC.1
15.6.5 FPT_ITC.1 Inter-TSF confidentiality during transmission
15.7 Integrity of exported TSF data (FPT_ITI)
15.7.1 Family behaviour
15.7.2 Components leveling and description
15.7.3 Management of FPT_ITI.1
126 15.7.4 Management of FPT_ITI.2
15.7.5 Audit of FPT_ITI.1
15.7.6 Audit of FPT_ITI.2
15.7.7 FPT_ITI.1 Inter-TSF detection of modification
15.7.8 FPT_ITI.2 Inter-TSF detection and correction of modification
127 15.8 Internal TOE TSF data transfer (FPT_ITT)
15.8.1 Family behaviour
15.8.2 Components leveling and description
15.8.3 Management of FPT_ITT.1
15.8.4 Management of FPT_ITT.2
128 15.8.5 Management of FPT_ITT.3
15.8.6 Audit of FPT_ITT.1, FPT_ITT.2
15.8.7 Audit of FPT_ITT.3
15.8.8 FPT_ITT.1 Basic internal TSF data transfer protection
15.8.9 FPT_ITT.2 TSF data transfer separation
129 15.8.10 FPT_ITT.3 TSF data integrity monitoring
15.9 TSF physical protection (FPT_PHP)
15.9.1 Family behaviour
15.9.2 Components leveling and description
130 15.9.3 Management of FPT_PHP.1
15.9.4 Management of FPT_PHP.2
15.9.5 Management of FPT_PHP.3
15.9.6 Audit of FPT_PHP.1
15.9.7 Audit of FPT_PHP.2
15.9.8 Audit of FPT_PHP.3
15.9.9 FPT_PHP.1 Passive detection of physical attack
131 15.9.10 FPT_PHP.2 Notification of physical attack
15.9.11 FPT_PHP.3 Resistance to physical attack
15.10 Trusted recovery (FPT_RCV)
15.10.1 Family behaviour
15.10.2 Components leveling and description
132 15.10.3 Management of FPT_RCV.1
15.10.4 Management of FPT_RCV.2, FPT_RCV.3
15.10.5 Management of FPT_RCV.4
15.10.6 Audit of FPT_RCV.1, FPT_RCV.2, FPT_RCV.3
15.10.7 Audit of FPT_RCV.4
15.10.8 FPT_RCV.1 Manual recovery
133 15.10.9 FPT_RCV.2 Automated recovery
15.10.10 FPT_RCV.3 Automated recovery without undue loss
15.10.11 FPT_RCV.4 Function recovery
134 15.11 Replay detection (FPT_RPL)
15.11.1 Family behaviour
15.11.2 Components leveling and description
15.11.3 Management of FPT_RPL.1
15.11.4 Audit of FPT_RPL.1
15.11.5 FPT_RPL.1 Replay detection
135 15.12 State synchrony protocol (FPT_SSP)
15.12.1 Family behaviour
15.12.2 Components leveling and description
15.12.3 Management of FPT_SSP.1, FPT_SSP.2
15.12.4 Audit of FPT_SSP.1, FPT_SSP.2
15.12.5 FPT_SSP.1 Simple trusted acknowledgement
15.12.6 FPT_SSP.2 Mutual trusted acknowledgement
136 15.13 Time stamps (FPT_STM)
15.13.1 Family behaviour
15.13.2 Components leveling and description
15.13.3 Management of FPT_STM.1
15.13.4 Management of FPT_STM.2
15.13.5 Audit of FPT_STM.1
15.13.6 Audit of FPT_STM.2
137 15.13.7 FPT_STM.1 Reliable time stamps
15.13.8 FPT_STM.2 Time source
15.14 Inter-TSF TSF data consistency (FPT_TDC)
15.14.1 Family behaviour
15.14.2 Components leveling and description
15.14.3 Management of FPT_TDC.1
138 15.14.4 Audit of FPT_TDC.1
15.14.5 FPT_TDC.1 Inter-TSF basic TSF data consistency
15.15 Testing of external entities (FPT_TEE)
15.15.1 Family behaviour
15.15.2 Components leveling and description
15.15.3 Management of FPT_TEE.1
139 15.15.4 Audit of FPT_TEE.1
15.15.5 FPT_TEE.1 Testing of external entities
15.16 Internal TOE TSF data replication consistency (FPT_TRC)
15.16.1 Family behaviour
15.16.2 Components leveling and description
15.16.3 Management of FPT_TRC.1
140 15.16.4 Audit of FPT_TRC.1
15.16.5 FPT_TRC.1 Internal TSF consistency
15.17 TSF self-test (FPT_TST)
15.17.1 Family behaviour
15.17.2 Components leveling and description
141 15.17.3 Management of FPT_TST.1
15.17.4 Audit of FPT_TST.1
15.17.5 FPT_TST.1 TSF self-testing
16.1 Class description
142 16.2 Fault tolerance (FRU_FLT)
16.2.1 Family behaviour
16.2.2 Components leveling and description
16.2.3 Management of FRU_FLT.1, FRU_FLT.2
16.2.4 Audit of FRU_FLT.1
16.2.5 Audit of FRU_FLT.2
143 16.2.6 FRU_FLT.1 Degraded fault tolerance
16.2.7 FRU_FLT.2 Limited fault tolerance
16.3 Priority of service (FRU_PRS)
16.3.1 Family behaviour
16.3.2 Components leveling and description
16.3.3 Management of FRU_PRS.1, FRU_PRS.2
144 16.3.4 Audit of FRU_PRS.1, FRU_PRS.2
16.3.5 FRU_PRS.1 Limited priority of service
16.3.6 FRU_PRS.2 Full priority of service
16.4 Resource allocation (FRU_RSA)
16.4.1 Family behaviour
16.4.2 Components leveling and description
145 16.4.3 Management of FRU_RSA.1
16.4.4 Management of FRU_RSA.2
16.4.5 Audit of FRU_RSA.1, FRU_RSA.2
16.4.6 FRU_RSA.1 Maximum quotas
16.4.7 FRU_RSA.2 Minimum and maximum quotas
146 17.1 Class description
17.2 Limitation on scope of selectable attributes (FTA_LSA)
17.2.1 Family behaviour
17.2.2 Components leveling and description
147 17.2.3 Management of FTA_LSA.1
17.2.4 Audit of FTA_LSA.1
17.2.5 FTA_LSA.1 Limitation on scope of selectable attributes
17.3 Limitation on multiple concurrent sessions (FTA_MCS)
17.3.1 Family behaviour
17.3.2 Components leveling and description
148 17.3.3 Management of FTA_MCS.1
17.3.4 Management of FTA_MCS.2
17.3.5 Audit of FTA_MCS.1, FTA_MCS.2
17.3.6 FTA_MCS.1 Basic limitation on multiple concurrent sessions
17.3.7 FTA_MCS.2 Per user attribute limitation on multiple concurrent sessions
149 17.4 Session locking and termination (FTA_SSL)
17.4.1 Family behaviour
17.4.2 Components leveling and description
17.4.3 Management of FTA_SSL.1
17.4.4 Management of FTA_SSL.2
17.4.5 Management of FTA_SSL.3
150 17.4.6 Management of FTA_SSL.4
17.4.7 Audit of FTA_SSL.1, FTA_SSL.2
17.4.8 Audit of FTA_SSL.3
17.4.9 Audit of FTA_SSL.4
17.4.10 FTA_SSL.1 TSF-initiated session locking
17.4.11 FTA_SSL.2 User-initiated locking
151 17.4.12 FTA_SSL.3 TSF-initiated termination
17.4.13 FTA_SSL.4 User-initiated termination
17.5 TOE access banners (FTA_TAB)
17.5.1 Family behaviour
17.5.2 Components leveling and description
17.5.3 Management of FTA_TAB.1
152 17.5.4 Audit of FTA_TAB.1
17.5.5 FTA_TAB.1 Default TOE access banners
17.6 TOE access history (FTA_TAH)
17.6.1 Family behaviour
17.6.2 Components leveling and description
17.6.3 Management of FTA_TAH.1
17.6.4 Audit of FTA_TAH.1
17.6.5 FTA_TAH.1 TOE access history
153 17.7 TOE session establishment (FTA_TSE)
17.7.1 Family behaviour
17.7.2 Components leveling and description
17.7.3 Management of FTA_TSE.1
17.7.4 Audit of FTA_TSE.1
17.7.5 FTA_TSE.1 TOE session establishment
154 18.1 Class description
155 18.2 Inter-TSF trusted channel (FTP_ITC)
18.2.1 Family behaviour
18.2.2 Components leveling and description
18.2.3 Management of FTP_ITC.1
18.2.4 Audit of FTP_ITC.1
18.2.5 FTP_ITC.1 Inter-TSF trusted channel
156 18.3 Trusted channel protocol (FTP_PRO)
18.3.1 Family behavior
18.3.2 Components leveling and description
18.3.3 Management of FTP_PRO.1
18.3.4 Management of FTP_PRO.2
18.3.5 Management of FTP_PRO.3
157 18.3.6 Audit of FTP_PRO.1
18.3.7 Audit of FTP_PRO.2
18.3.8 Audit of FTP_PRO.3
18.3.9 FTP_PRO.1 Trusted channel protocol
158 18.3.10 FTP_PRO.2 Trusted channel establishment
18.3.11 FTP_PRO.3 Trusted channel data protection
159 18.4 Trusted path (FTP_TRP)
18.4.1 Family behaviour
18.4.2 Components leveling and description
18.4.3 Management of FTP_TRP.1
18.4.4 Audit of FTP_TRP.1
18.4.5 FTP_TRP.1 Trusted path
BS EN ISO/IEC 15408-2:2023
$215.11