{"id":450563,"date":"2024-10-20T09:11:55","date_gmt":"2024-10-20T09:11:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-15408-22023\/"},"modified":"2024-10-26T17:09:22","modified_gmt":"2024-10-26T17:09:22","slug":"bs-en-iso-iec-15408-22023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-15408-22023\/","title":{"rendered":"BS EN ISO\/IEC 15408-2:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
24<\/td>\n5.1 General
5.2 Organization of this document <\/td>\n<\/tr>\n
29<\/td>\n7.1 Overview
7.1.1 General
7.1.2 Class structure <\/td>\n<\/tr>\n
30<\/td>\n7.1.3 Family structure <\/td>\n<\/tr>\n
31<\/td>\n7.1.4 Component structure <\/td>\n<\/tr>\n
33<\/td>\n7.2 Component catalogue <\/td>\n<\/tr>\n
34<\/td>\n8.1 Class description <\/td>\n<\/tr>\n
35<\/td>\n8.2 Security audit automatic response (FAU_ARP)
8.2.1 Family behaviour
8.2.2 Components leveling and description
8.2.3 Management of FAU_ARP.1
8.2.4 Audit of FAU_ARP.1
8.2.5 FAU_ARP.1 Security alarms
8.3 Security audit data generation (FAU_GEN)
8.3.1 Family behaviour
8.3.2 Components leveling and description <\/td>\n<\/tr>\n
36<\/td>\n8.3.3 Management of FAU_GEN.1, FAU_GEN.2
8.3.4 Audit of FAU_GEN.1, FAU_GEN.2
8.3.5 FAU_GEN.1 Audit data generation
8.3.6 FAU_GEN.2 User identity association <\/td>\n<\/tr>\n
37<\/td>\n8.4 Security audit analysis (FAU_SAA)
8.4.1 Family behaviour
8.4.2 Components leveling and description
8.4.3 Management of FAU_SAA.1 <\/td>\n<\/tr>\n
38<\/td>\n8.4.4 Management of FAU_SAA.2
8.4.5 Management of FAU_SAA.3
8.4.6 Management of FAU_SAA.4
8.4.7 Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4
8.4.8 FAU_SAA.1 Potential violation analysis
8.4.9 FAU_SAA.2 Profile based anomaly detection <\/td>\n<\/tr>\n
39<\/td>\n8.4.10 FAU_SAA.3 Simple attack heuristics
8.4.11 FAU_SAA.4 Complex attack heuristics <\/td>\n<\/tr>\n
40<\/td>\n8.5 Security audit review (FAU_SAR)
8.5.1 Family behaviour
8.5.2 Components leveling and description
8.5.3 Management of FAU_SAR.1
8.5.4 Management of FAU_SAR.2, FAU_SAR.3
8.5.5 Audit of FAU_SAR.1 <\/td>\n<\/tr>\n
41<\/td>\n8.5.6 Audit of FAU_SAR.2
8.5.7 Audit of FAU_SAR.3
8.5.8 FAU_SAR.1 Audit review
8.5.9 FAU_SAR.2 Restricted audit review
8.5.10 FAU_SAR.3 Selectable audit review <\/td>\n<\/tr>\n
42<\/td>\n8.6 Security audit event selection (FAU_SEL)
8.6.1 Family behaviour
8.6.2 Components leveling and description
8.6.3 Management of FAU_SEL.1
8.6.4 Audit of FAU_SEL.1
8.6.5 FAU_SEL.1 Selective audit
8.7 Security audit data storage (FAU_STG)
8.7.1 Family behaviour <\/td>\n<\/tr>\n
43<\/td>\n8.7.2 Components leveling and description
8.7.3 Management of FAU_STG.1
8.7.4 Management of FAU_STG.2
8.7.5 Management of FAU_STG.3
8.7.6 Management of FAU_STG.4
8.7.7 Management of FAU_STG.5 <\/td>\n<\/tr>\n
44<\/td>\n8.7.8 Audit of FAU_STG.1
8.7.9 Audit of FAU_STG.2, FAU_STG.3
8.7.10 Audit of FAU_STG.4
8.7.11 Audit of FAU_STG.5
8.7.12 FAU_STG.1 Audit data storage location
8.7.13 FAU_STG.2 Protected audit data storage <\/td>\n<\/tr>\n
45<\/td>\n8.7.14 FAU_STG.3 Guarantees of audit data availability
8.7.15 FAU_STG.4 Action in case of possible audit data loss
8.7.16 FAU_STG.5 Prevention of audit data loss
9.1 Class description <\/td>\n<\/tr>\n
46<\/td>\n9.2 Non-repudiation of origin (FCO_NRO)
9.2.1 Family behaviour
9.2.2 Components leveling and description
9.2.3 Management of FCO_NRO.1, FCO_NRO.2
9.2.4 Audit of FCO_NRO.1 <\/td>\n<\/tr>\n
47<\/td>\n9.2.5 Audit of FCO_NRO.2
9.2.6 FCO_NRO.1 Selective proof of origin
9.2.7 FCO_NRO.2 Enforced proof of origin <\/td>\n<\/tr>\n
48<\/td>\n9.3 Non-repudiation of receipt (FCO_NRR)
9.3.1 Family behaviour
9.3.2 Components leveling and description
9.3.3 Management of FCO_NRR.1, FCO_NRR.2
9.3.4 Audit of FCO_NRR.1
9.3.5 Audit of FCO_NRR.2 <\/td>\n<\/tr>\n
49<\/td>\n9.3.6 FCO_NRR.1 Selective proof of receipt
9.3.7 FCO_NRR.2 Enforced proof of receipt
10.1 Class description <\/td>\n<\/tr>\n
50<\/td>\n10.2 Cryptographic key management (FCS_CKM)
10.2.1 Family behaviour
10.2.2 Components leveling and description <\/td>\n<\/tr>\n
51<\/td>\n10.2.3 Management of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6
10.2.4 Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6
10.2.5 FCS_CKM.1 Cryptographic key generation <\/td>\n<\/tr>\n
52<\/td>\n10.2.6 FCS_CKM.2 Cryptographic key distribution
10.2.7 FCS_CKM.3 Cryptographic key access
10.2.8 FCS_CKM.4 Cryptographic key destruction <\/td>\n<\/tr>\n
53<\/td>\n10.2.9 FCS_CKM.5 Cryptographic key derivation
10.2.10 FCS_CKM.6 Timing and event of cryptographic key destruction
10.3 Cryptographic operation (FCS_COP)
10.3.1 Family behaviour
10.3.2 Components leveling and description <\/td>\n<\/tr>\n
54<\/td>\n10.3.3 Management of FCS_COP.1
10.3.4 Audit of FCS_COP.1
10.3.5 FCS_COP.1 Cryptographic operation
10.4 Random bit generation (FCS_RBG)
10.4.1 Family behaviour
10.4.2 Components leveling and description <\/td>\n<\/tr>\n
55<\/td>\n10.4.3 Management of FCS_RBG.1, FCS_RBG.2, FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RBG.6
10.4.4 Audit of FCS_RBG.1, FCS_RBG.2
10.4.5 Audit of FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RBG.6
10.4.6 FCS_RBG.1 Random bit generation (RBG) <\/td>\n<\/tr>\n
56<\/td>\n10.4.7 FCS_RBG.2 Random bit generation (external seeding)
10.4.8 FCS_RBG.3 Random bit generation (internal seeding \u2013 single source) <\/td>\n<\/tr>\n
57<\/td>\n10.4.9 FCS_RBG.4 Random bit generation (internal seeding \u2013 multiple sources)
10.4.10 FCS_RBG.5 Random bit generation (combining noise sources)
10.4.11 FCS_RBG.6 Random bit generation service
10.5 Generation of random numbers (FCS_RNG)
10.5.1 Family behaviour <\/td>\n<\/tr>\n
58<\/td>\n10.5.2 Components leveling and description
10.5.3 Management of FCS_RNG.1
10.5.4 Audit of FCS_RNG.1
10.5.5 FCS_RNG.1 Random number generation
11.1 Class description <\/td>\n<\/tr>\n
60<\/td>\n11.2 Access control policy (FDP_ACC)
11.2.1 Family behaviour <\/td>\n<\/tr>\n
61<\/td>\n11.2.2 Components leveling and description
11.2.3 Management of FDP_ACC.1, FDP_ACC.2
11.2.4 Audit of FDP_ACC.1, FDP_ACC.2
11.2.5 FDP_ACC.1 Subset access control
11.2.6 FDP_ACC.2 Complete access control <\/td>\n<\/tr>\n
62<\/td>\n11.3 Access control functions (FDP_ACF)
11.3.1 Family behaviour
11.3.2 Components leveling and description
11.3.3 Management of FDP_ACF.1
11.3.4 Audit of FDP_ACF.1
11.3.5 FDP_ACF.1 Security attribute-based access control <\/td>\n<\/tr>\n
63<\/td>\n11.4 Data authentication (FDP_DAU)
11.4.1 Family behaviour
11.4.2 Components leveling and description
11.4.3 Management of FDP_DAU.1, FDP_DAU.2
11.4.4 Audit of FDP_DAU.1 <\/td>\n<\/tr>\n
64<\/td>\n11.4.5 Audit of FDP_DAU.2
11.4.6 FDP_DAU.1 Basic Data Authentication
11.4.7 FDP_DAU.2 Data Authentication with Identity of Guarantor
11.5 Export from the TOE (FDP_ETC)
11.5.1 Family behaviour <\/td>\n<\/tr>\n
65<\/td>\n11.5.2 Components leveling and description
11.5.3 Management of FDP_ETC.1
11.5.4 Management of FDP_ETC.2
11.5.5 Audit of FDP_ETC.1, FDP_ETC.2
11.5.6 FDP_ETC.1 Export of user data without security attributes
11.5.7 FDP_ETC.2 Export of user data with security attributes <\/td>\n<\/tr>\n
66<\/td>\n11.6 Information flow control policy (FDP_IFC)
11.6.1 Family behaviour
11.6.2 Components leveling and description <\/td>\n<\/tr>\n
67<\/td>\n11.6.3 Management of FDP_IFC.1, FDP_IFC.2
11.6.4 Audit of FDP_IFC.1, FDP_IFC.2
11.6.5 FDP_IFC.1 Subset information flow control
11.6.6 FDP_IFC.2 Complete information flow control
11.7 Information flow control functions (FDP_IFF)
11.7.1 Family behaviour <\/td>\n<\/tr>\n
68<\/td>\n11.7.2 Components leveling and description
11.7.3 Management of FDP_IFF.1, FDP_IFF.2
11.7.4 Management of FDP_IFF.3, FDP_IFF.4, FDP_IFF.5 <\/td>\n<\/tr>\n
69<\/td>\n11.7.5 Management of FDP_IFF.6
11.7.6 Audit of FDP_IFF.1, FDP_IFF.2, FDP_IFF.5
11.7.7 Audit of FDP_IFF.3, FDP_IFF.4, FDP_IFF.6
11.7.8 FDP_IFF.1 Simple security attributes <\/td>\n<\/tr>\n
70<\/td>\n11.7.9 FDP_IFF.2 Hierarchical security attributes <\/td>\n<\/tr>\n
71<\/td>\n11.7.10 FDP_IFF.3 Limited illicit information flows
11.7.11 FDP_IFF.4 Partial elimination of illicit information flows
11.7.12 FDP_IFF.5 No illicit information flows
11.7.13 FDP_IFF.6 Illicit information flow monitoring <\/td>\n<\/tr>\n
72<\/td>\n11.8 Information Retention Control (FDP_IRC)
11.8.1 Family behaviour
11.8.2 Components leveling and description <\/td>\n<\/tr>\n
73<\/td>\n11.8.3 Management of FDP_IRC.1
11.8.4 Audit of FDP_IRC.1
11.8.5 FDP_IRC.1 Information retention control
11.9 Import from outside of the TOE (FDP_ITC)
11.9.1 Family behaviour
11.9.2 Components leveling and description <\/td>\n<\/tr>\n
74<\/td>\n11.9.3 Management of FDP_ITC.1, FDP_ITC.2
11.9.4 Audit of FDP_ITC.1, FDP_ITC.2
11.9.5 FDP_ITC.1 Import of user data without security attributes
11.9.6 FDP_ITC.2 Import of user data with security attributes <\/td>\n<\/tr>\n
75<\/td>\n11.10 Internal TOE transfer (FDP_ITT)
11.10.1 Family behaviour
11.10.2 Components leveling and description
11.10.3 Management of FDP_ITT.1, FDP_ITT.2 <\/td>\n<\/tr>\n
76<\/td>\n11.10.4 Management of FDP_ITT.3, FDP_ITT.4
11.10.5 Audit of FDP_ITT.1, FDP_ITT.2
11.10.6 Audit of FDP_ITT.3, FDP_ITT.4
11.10.7 FDP_ITT.1 Basic internal transfer protection
11.10.8 FDP_ITT.2 Transmission separation by attribute <\/td>\n<\/tr>\n
77<\/td>\n11.10.9 FDP_ITT.3 Integrity monitoring
11.10.10 FDP_ITT.4 Attribute-based integrity monitoring
11.11 Residual information protection (FDP_RIP)
11.11.1 Family behaviour <\/td>\n<\/tr>\n
78<\/td>\n11.11.2 Components leveling and description
11.11.3 Management of FDP_RIP.1, FDP_RIP.2
11.11.4 Audit of FDP_RIP.1, FDP_RIP.2
11.11.5 FDP_RIP.1 Subset residual information protection
11.11.6 FDP_RIP.2 Full residual information protection <\/td>\n<\/tr>\n
79<\/td>\n11.12 Rollback (FDP_ROL)
11.12.1 Family behaviour
11.12.2 Components leveling and description
11.12.3 Management of FDP_ROL.1, FDP_ROL.2
11.12.4 Audit of FDP_ROL.1, FDP_ROL.2
11.12.5 FDP_ROL.1 Basic rollback <\/td>\n<\/tr>\n
80<\/td>\n11.12.6 FDP_ROL.2 Advanced rollback
11.13 Stored data confidentiality (FDP_SDC)
11.13.1 Family behaviour
11.13.2 Components leveling and description
11.13.3 Management of FDP_SDC.1, FDP_SDC.2 <\/td>\n<\/tr>\n
81<\/td>\n11.13.4 Audit of FDP_SDC.1, FDP_SDC.2
11.13.5 FDP_SDC.1 Stored data confidentiality
11.13.6 FDP_SDC.2 Stored data confidentiality with dedicated method
11.14 Stored data integrity (FDP_SDI)
11.14.1 Family behaviour
11.14.2 Components leveling and description <\/td>\n<\/tr>\n
82<\/td>\n11.14.3 Management of FDP_SDI.1
11.14.4 Management of FDP_SDI.2
11.14.5 Audit of FDP_SDI.1
11.14.6 Audit of FDP_SDI.2
11.14.7 FDP_SDI.1 Stored data integrity monitoring
11.14.8 FDP_SDI.2 Stored data integrity monitoring and action <\/td>\n<\/tr>\n
83<\/td>\n11.15 Inter-TSF user data confidentiality transfer protection (FDP_UCT)
11.15.1 Family behaviour
11.15.2 Components leveling and description
11.15.3 Management of FDP_UCT.1
11.15.4 Audit of FDP_UCT.1
11.15.5 FDP_UCT.1 Basic data exchange confidentiality <\/td>\n<\/tr>\n
84<\/td>\n11.16 Inter-TSF user data integrity transfer protection (FDP_UIT)
11.16.1 Family behaviour
11.16.2 Components leveling and description
11.16.3 Management of FDP_UIT.1, FDP_UIT.2, FDP_UIT.3
11.16.4 Audit of FDP_UIT.1 <\/td>\n<\/tr>\n
85<\/td>\n11.16.5 Audit of FDP_UIT.2, FDP_UIT.3
11.16.6 FDP_UIT.1 Data exchange integrity
11.16.7 FDP_UIT.2 Source data exchange recovery <\/td>\n<\/tr>\n
86<\/td>\n11.16.8 FDP_UIT.3 Destination data exchange recovery
12.1 Class description <\/td>\n<\/tr>\n
87<\/td>\n12.2 Authentication failures (FIA_AFL)
12.2.1 Family behaviour
12.2.2 Components leveling and description <\/td>\n<\/tr>\n
88<\/td>\n12.2.3 Management of FIA_AFL.1
12.2.4 Audit of FIA_AFL.1
12.2.5 FIA_AFL.1 Authentication failure handling
12.3 Authentication proof of identity (FIA_API)
12.3.1 Family behaviour
12.3.2 Components leveling and description
12.3.3 Management of FIA_API.1 <\/td>\n<\/tr>\n
89<\/td>\n12.3.4 Audit of FIA_API.1
12.3.5 FIA_API.1 Authentication proof of identity
12.4 User attribute definition (FIA_ATD)
12.4.1 Family behaviour
12.4.2 Components leveling and description
12.4.3 Management of FIA_ATD.1
12.4.4 Audit of FIA_ATD.1
12.4.5 FIA_ATD.1 User attribute definition <\/td>\n<\/tr>\n
90<\/td>\n12.5 Specification of secrets (FIA_SOS)
12.5.1 Family behaviour
12.5.2 Components leveling and description
12.5.3 Management of FIA_SOS.1
12.5.4 Management of FIA_SOS.2
12.5.5 Audit of FIA_SOS.1, FIA_SOS.2
12.5.6 FIA_SOS.1 Verification of secrets <\/td>\n<\/tr>\n
91<\/td>\n12.5.7 FIA_SOS.2 TSF Generation of secrets
12.6 User authentication (FIA_UAU)
12.6.1 Family behaviour
12.6.2 Components leveling and description <\/td>\n<\/tr>\n
92<\/td>\n12.6.3 Management of FIA_UAU.1
12.6.4 Management of FIA_UAU.2
12.6.5 Management of FIA_UAU.3, FIA_UAU.4, FIA_UAU.7
12.6.6 Management of FIA_UAU.5
12.6.7 Management of FIA_UAU.6
12.6.8 Management of FIA_UAU.7
12.6.9 Audit of FIA_UAU.1 <\/td>\n<\/tr>\n
93<\/td>\n12.6.10 Audit of FIA_UAU.2
12.6.11 Audit of FIA_UAU.3
12.6.12 Audit of FIA_UAU.4
12.6.13 Audit of FIA_UAU.5
12.6.14 Audit of FIA_UAU.6
12.6.15 Audit of FIA_UAU.7
12.6.16 FIA_UAU.1 Timing of authentication <\/td>\n<\/tr>\n
94<\/td>\n12.6.17 FIA_UAU.2 User authentication before any action
12.6.18 FIA_UAU.3 Unforgeable authentication
12.6.19 FIA_UAU.4 Single-use authentication mechanisms
12.6.20 FIA_UAU.5 Multiple authentication mechanisms <\/td>\n<\/tr>\n
95<\/td>\n12.6.21 FIA_UAU.6 Re-authenticating
12.6.22 FIA_UAU.7 Protected authentication feedback
12.7 User identification (FIA_UID)
12.7.1 Family behaviour
12.7.2 Components leveling and description <\/td>\n<\/tr>\n
96<\/td>\n12.7.3 Management of FIA_UID.1
12.7.4 Management of FIA_UID.2
12.7.5 Audit of FIA_UID.1, FIA_UID.2
12.7.6 FIA_UID.1 Timing of identification
12.7.7 FIA_UID.2 User identification before any action <\/td>\n<\/tr>\n
97<\/td>\n12.8 User-subject binding (FIA_USB)
12.8.1 Family behaviour
12.8.2 Components leveling and description
12.8.3 Management of FIA_USB.1
12.8.4 Audit of FIA_USB.1
12.8.5 FIA_USB.1 User-subject binding <\/td>\n<\/tr>\n
98<\/td>\n13.1 Class description <\/td>\n<\/tr>\n
99<\/td>\n13.2 Limited capabilities and availability (FMT_LIM)
13.2.1 Family behaviour
13.2.2 Components leveling and description <\/td>\n<\/tr>\n
100<\/td>\n13.2.3 Management of FMT_LIM.1, FMT_LIM.2
13.2.4 Audit of FMT_LIM.1
13.2.5 FMT_LIM.1 Limited capabilities
13.2.6 FMT_LIM.2 Limited availability
13.3 Management of functions in TSF (FMT_MOF)
13.3.1 Family behaviour
13.3.2 Components leveling and description <\/td>\n<\/tr>\n
101<\/td>\n13.3.3 Management of FMT_MOF.1
13.3.4 Audit of FMT_MOF.1
13.3.5 FMT_MOF.1 Management of security functions behaviour
13.4 Management of security attributes (FMT_MSA)
13.4.1 Family behaviour
13.4.2 Components leveling and description <\/td>\n<\/tr>\n
102<\/td>\n13.4.3 Management of FMT_MSA.1
13.4.4 Management of FMT_MSA.2
13.4.5 Management of FMT_MSA.3
13.4.6 Management of FMT_MSA.4
13.4.7 Audit of FMT_MSA.1
13.4.8 Audit of FMT_MSA.2
13.4.9 Audit of FMT_MSA.3 <\/td>\n<\/tr>\n
103<\/td>\n13.4.10 Audit of FMT_MSA.4
13.4.11 FMT_MSA.1 Management of security attributes
13.4.12 FMT_MSA.2 Secure security attributes
13.4.13 FMT_MSA.3 Static attribute initialization <\/td>\n<\/tr>\n
104<\/td>\n13.4.14 FMT_MSA.4 Security attribute value inheritance
13.5 Management of TSF data (FMT_MTD)
13.5.1 Family behaviour
13.5.2 Components leveling and description
13.5.3 Management of FMT_MTD.1
13.5.4 Management of FMT_MTD.2 <\/td>\n<\/tr>\n
105<\/td>\n13.5.5 Management of FMT_MTD.3
13.5.6 Audit of FMT_MTD.1
13.5.7 Audit of FMT_MTD.2
13.5.8 Audit of FMT_MTD.3
13.5.9 FMT_MTD.1 Management of TSF data
13.5.10 FMT_MTD.2 Management of limits on TSF data <\/td>\n<\/tr>\n
106<\/td>\n13.5.11 FMT_MTD.3 Secure TSF data
13.6 Revocation (FMT_REV)
13.6.1 Family behaviour
13.6.2 Components leveling and description
13.6.3 Management of FMT_REV.1
13.6.4 Audit of FMT_REV.1
13.6.5 FMT_REV.1 Revocation <\/td>\n<\/tr>\n
107<\/td>\n13.7 Security attribute expiration (FMT_SAE)
13.7.1 Family behaviour
13.7.2 Components leveling and description
13.7.3 Management of FMT_SAE.1
13.7.4 Audit of FMT_SAE.1
13.7.5 FMT_SAE.1 Time-limited authorization <\/td>\n<\/tr>\n
108<\/td>\n13.8 Specification of Management Functions (FMT_SMF)
13.8.1 Family behaviour
13.8.2 Components leveling and description
13.8.3 Management of FMT_SMF.1
13.8.4 Audit of FMT_SMF.1
13.8.5 FMT_SMF.1 Specification of Management Functions <\/td>\n<\/tr>\n
109<\/td>\n13.9 Security management roles (FMT_SMR)
13.9.1 Family behaviour
13.9.2 Components leveling and description
13.9.3 Management of FMT_SMR.1
13.9.4 Management of FMT_SMR.2
13.9.5 Management of FMT_SMR.3
13.9.6 Audit of FMT_SMR.1
13.9.7 Audit of FMT_SMR.2 <\/td>\n<\/tr>\n
110<\/td>\n13.9.8 Audit of FMT_SMR.3
13.9.9 FMT_SMR.1 Security roles
13.9.10 FMT_SMR.2 Restrictions on security roles
13.9.11 FMT_SMR.3 Assuming roles <\/td>\n<\/tr>\n
111<\/td>\n14.1 Class description
14.2 Anonymity (FPR_ANO)
14.2.1 Family behaviour
14.2.2 Components leveling and description <\/td>\n<\/tr>\n
112<\/td>\n14.2.3 Management of FPR_ANO.1, FPR_ANO.2
14.2.4 Audit of FPR_ANO.1, FPR_ANO.2
14.2.5 FPR_ANO.1 Anonymity
14.2.6 FPR_ANO.2 Anonymity without soliciting information
14.3 Pseudonymity (FPR_PSE)
14.3.1 Family behaviour
14.3.2 Components leveling and description <\/td>\n<\/tr>\n
113<\/td>\n14.3.3 Management of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3
14.3.4 Audit of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3
14.3.5 FPR_PSE.1 Pseudonymity
14.3.6 FPR_PSE.2 Reversible pseudonymity <\/td>\n<\/tr>\n
114<\/td>\n14.3.7 FPR_PSE.3 Alias pseudonymity
14.4 Unlinkability (FPR_UNL)
14.4.1 Family behaviour
14.4.2 Components leveling and description <\/td>\n<\/tr>\n
115<\/td>\n14.4.3 Management of FPR_UNL.1
14.4.4 Audit of FPR_UNL.1
14.4.5 FPR_UNL.1 Unlinkability of operations
14.5 Unobservability (FPR_UNO)
14.5.1 Family behaviour
14.5.2 Components leveling and description <\/td>\n<\/tr>\n
116<\/td>\n14.5.3 Management of FPR_UNO.1, FPR_UNO.2
14.5.4 Management of FPR_UNO.3
14.5.5 Management of FPR_UNO.4
14.5.6 Audit of FPR_UNO.1, FPR_UNO.2
14.5.7 Audit of FPR_UNO.3
14.5.8 Audit of FPR_UNO.4 <\/td>\n<\/tr>\n
117<\/td>\n14.5.9 FPR_UNO.1 Unobservability
14.5.10 FPR_UNO.2 Allocation of information impacting unobservability
14.5.11 FPR_UNO.3 Unobservability without soliciting information
14.5.12 FPR_UNO.4 Authorized user observability <\/td>\n<\/tr>\n
118<\/td>\n15.1 Class description <\/td>\n<\/tr>\n
120<\/td>\n15.2 TOE emanation (FPT_EMS)
15.2.1 Family behaviour <\/td>\n<\/tr>\n
121<\/td>\n15.2.2 Components leveling and description
15.2.3 Management of FPT_EMS.1
15.2.4 Audit of FPT_EMS.1
15.2.5 FPT_EMS.1 Emanation of TSF and User data
15.3 Fail secure (FPT_FLS)
15.3.1 Family behaviour <\/td>\n<\/tr>\n
122<\/td>\n15.3.2 Components leveling and description
15.3.3 Management of FPT_FLS.1
15.3.4 Audit of FPT_FLS.1
15.3.5 FPT_FLS.1 Failure with preservation of secure state
15.4 TSF initialization (FPT_INI)
15.4.1 Family behaviour
15.4.2 Components leveling and description <\/td>\n<\/tr>\n
123<\/td>\n15.4.3 Management of FPT_INI.1
15.4.4 Audit of FPT_INI.1
15.4.5 FPT_INI.1 TSF initialization
15.5 Availability of exported TSF data (FPT_ITA)
15.5.1 Family behaviour
15.5.2 Components leveling and description <\/td>\n<\/tr>\n
124<\/td>\n15.5.3 Management of FPT_ITA.1
15.5.4 Audit of FPT_ITA.1
15.5.5 FPT_ITA.1 Inter-TSF availability within a defined availability metric
15.6 Confidentiality of exported TSF data (FPT_ITC)
15.6.1 Family behaviour
15.6.2 Components leveling and description <\/td>\n<\/tr>\n
125<\/td>\n15.6.3 Management of FPT_ITC.1
15.6.4 Audit of FPT_ITC.1
15.6.5 FPT_ITC.1 Inter-TSF confidentiality during transmission
15.7 Integrity of exported TSF data (FPT_ITI)
15.7.1 Family behaviour
15.7.2 Components leveling and description
15.7.3 Management of FPT_ITI.1 <\/td>\n<\/tr>\n
126<\/td>\n15.7.4 Management of FPT_ITI.2
15.7.5 Audit of FPT_ITI.1
15.7.6 Audit of FPT_ITI.2
15.7.7 FPT_ITI.1 Inter-TSF detection of modification
15.7.8 FPT_ITI.2 Inter-TSF detection and correction of modification <\/td>\n<\/tr>\n
127<\/td>\n15.8 Internal TOE TSF data transfer (FPT_ITT)
15.8.1 Family behaviour
15.8.2 Components leveling and description
15.8.3 Management of FPT_ITT.1
15.8.4 Management of FPT_ITT.2 <\/td>\n<\/tr>\n
128<\/td>\n15.8.5 Management of FPT_ITT.3
15.8.6 Audit of FPT_ITT.1, FPT_ITT.2
15.8.7 Audit of FPT_ITT.3
15.8.8 FPT_ITT.1 Basic internal TSF data transfer protection
15.8.9 FPT_ITT.2 TSF data transfer separation <\/td>\n<\/tr>\n
129<\/td>\n15.8.10 FPT_ITT.3 TSF data integrity monitoring
15.9 TSF physical protection (FPT_PHP)
15.9.1 Family behaviour
15.9.2 Components leveling and description <\/td>\n<\/tr>\n
130<\/td>\n15.9.3 Management of FPT_PHP.1
15.9.4 Management of FPT_PHP.2
15.9.5 Management of FPT_PHP.3
15.9.6 Audit of FPT_PHP.1
15.9.7 Audit of FPT_PHP.2
15.9.8 Audit of FPT_PHP.3
15.9.9 FPT_PHP.1 Passive detection of physical attack <\/td>\n<\/tr>\n
131<\/td>\n15.9.10 FPT_PHP.2 Notification of physical attack
15.9.11 FPT_PHP.3 Resistance to physical attack
15.10 Trusted recovery (FPT_RCV)
15.10.1 Family behaviour
15.10.2 Components leveling and description <\/td>\n<\/tr>\n
132<\/td>\n15.10.3 Management of FPT_RCV.1
15.10.4 Management of FPT_RCV.2, FPT_RCV.3
15.10.5 Management of FPT_RCV.4
15.10.6 Audit of FPT_RCV.1, FPT_RCV.2, FPT_RCV.3
15.10.7 Audit of FPT_RCV.4
15.10.8 FPT_RCV.1 Manual recovery <\/td>\n<\/tr>\n
133<\/td>\n15.10.9 FPT_RCV.2 Automated recovery
15.10.10 FPT_RCV.3 Automated recovery without undue loss
15.10.11 FPT_RCV.4 Function recovery <\/td>\n<\/tr>\n
134<\/td>\n15.11 Replay detection (FPT_RPL)
15.11.1 Family behaviour
15.11.2 Components leveling and description
15.11.3 Management of FPT_RPL.1
15.11.4 Audit of FPT_RPL.1
15.11.5 FPT_RPL.1 Replay detection <\/td>\n<\/tr>\n
135<\/td>\n15.12 State synchrony protocol (FPT_SSP)
15.12.1 Family behaviour
15.12.2 Components leveling and description
15.12.3 Management of FPT_SSP.1, FPT_SSP.2
15.12.4 Audit of FPT_SSP.1, FPT_SSP.2
15.12.5 FPT_SSP.1 Simple trusted acknowledgement
15.12.6 FPT_SSP.2 Mutual trusted acknowledgement <\/td>\n<\/tr>\n
136<\/td>\n15.13 Time stamps (FPT_STM)
15.13.1 Family behaviour
15.13.2 Components leveling and description
15.13.3 Management of FPT_STM.1
15.13.4 Management of FPT_STM.2
15.13.5 Audit of FPT_STM.1
15.13.6 Audit of FPT_STM.2 <\/td>\n<\/tr>\n
137<\/td>\n15.13.7 FPT_STM.1 Reliable time stamps
15.13.8 FPT_STM.2 Time source
15.14 Inter-TSF TSF data consistency (FPT_TDC)
15.14.1 Family behaviour
15.14.2 Components leveling and description
15.14.3 Management of FPT_TDC.1 <\/td>\n<\/tr>\n
138<\/td>\n15.14.4 Audit of FPT_TDC.1
15.14.5 FPT_TDC.1 Inter-TSF basic TSF data consistency
15.15 Testing of external entities (FPT_TEE)
15.15.1 Family behaviour
15.15.2 Components leveling and description
15.15.3 Management of FPT_TEE.1 <\/td>\n<\/tr>\n
139<\/td>\n15.15.4 Audit of FPT_TEE.1
15.15.5 FPT_TEE.1 Testing of external entities
15.16 Internal TOE TSF data replication consistency (FPT_TRC)
15.16.1 Family behaviour
15.16.2 Components leveling and description
15.16.3 Management of FPT_TRC.1 <\/td>\n<\/tr>\n
140<\/td>\n15.16.4 Audit of FPT_TRC.1
15.16.5 FPT_TRC.1 Internal TSF consistency
15.17 TSF self-test (FPT_TST)
15.17.1 Family behaviour
15.17.2 Components leveling and description <\/td>\n<\/tr>\n
141<\/td>\n15.17.3 Management of FPT_TST.1
15.17.4 Audit of FPT_TST.1
15.17.5 FPT_TST.1 TSF self-testing
16.1 Class description <\/td>\n<\/tr>\n
142<\/td>\n16.2 Fault tolerance (FRU_FLT)
16.2.1 Family behaviour
16.2.2 Components leveling and description
16.2.3 Management of FRU_FLT.1, FRU_FLT.2
16.2.4 Audit of FRU_FLT.1
16.2.5 Audit of FRU_FLT.2 <\/td>\n<\/tr>\n
143<\/td>\n16.2.6 FRU_FLT.1 Degraded fault tolerance
16.2.7 FRU_FLT.2 Limited fault tolerance
16.3 Priority of service (FRU_PRS)
16.3.1 Family behaviour
16.3.2 Components leveling and description
16.3.3 Management of FRU_PRS.1, FRU_PRS.2 <\/td>\n<\/tr>\n
144<\/td>\n16.3.4 Audit of FRU_PRS.1, FRU_PRS.2
16.3.5 FRU_PRS.1 Limited priority of service
16.3.6 FRU_PRS.2 Full priority of service
16.4 Resource allocation (FRU_RSA)
16.4.1 Family behaviour
16.4.2 Components leveling and description <\/td>\n<\/tr>\n
145<\/td>\n16.4.3 Management of FRU_RSA.1
16.4.4 Management of FRU_RSA.2
16.4.5 Audit of FRU_RSA.1, FRU_RSA.2
16.4.6 FRU_RSA.1 Maximum quotas
16.4.7 FRU_RSA.2 Minimum and maximum quotas <\/td>\n<\/tr>\n
146<\/td>\n17.1 Class description
17.2 Limitation on scope of selectable attributes (FTA_LSA)
17.2.1 Family behaviour
17.2.2 Components leveling and description <\/td>\n<\/tr>\n
147<\/td>\n17.2.3 Management of FTA_LSA.1
17.2.4 Audit of FTA_LSA.1
17.2.5 FTA_LSA.1 Limitation on scope of selectable attributes
17.3 Limitation on multiple concurrent sessions (FTA_MCS)
17.3.1 Family behaviour
17.3.2 Components leveling and description <\/td>\n<\/tr>\n
148<\/td>\n17.3.3 Management of FTA_MCS.1
17.3.4 Management of FTA_MCS.2
17.3.5 Audit of FTA_MCS.1, FTA_MCS.2
17.3.6 FTA_MCS.1 Basic limitation on multiple concurrent sessions
17.3.7 FTA_MCS.2 Per user attribute limitation on multiple concurrent sessions <\/td>\n<\/tr>\n
149<\/td>\n17.4 Session locking and termination (FTA_SSL)
17.4.1 Family behaviour
17.4.2 Components leveling and description
17.4.3 Management of FTA_SSL.1
17.4.4 Management of FTA_SSL.2
17.4.5 Management of FTA_SSL.3 <\/td>\n<\/tr>\n
150<\/td>\n17.4.6 Management of FTA_SSL.4
17.4.7 Audit of FTA_SSL.1, FTA_SSL.2
17.4.8 Audit of FTA_SSL.3
17.4.9 Audit of FTA_SSL.4
17.4.10 FTA_SSL.1 TSF-initiated session locking
17.4.11 FTA_SSL.2 User-initiated locking <\/td>\n<\/tr>\n
151<\/td>\n17.4.12 FTA_SSL.3 TSF-initiated termination
17.4.13 FTA_SSL.4 User-initiated termination
17.5 TOE access banners (FTA_TAB)
17.5.1 Family behaviour
17.5.2 Components leveling and description
17.5.3 Management of FTA_TAB.1 <\/td>\n<\/tr>\n
152<\/td>\n17.5.4 Audit of FTA_TAB.1
17.5.5 FTA_TAB.1 Default TOE access banners
17.6 TOE access history (FTA_TAH)
17.6.1 Family behaviour
17.6.2 Components leveling and description
17.6.3 Management of FTA_TAH.1
17.6.4 Audit of FTA_TAH.1
17.6.5 FTA_TAH.1 TOE access history <\/td>\n<\/tr>\n
153<\/td>\n17.7 TOE session establishment (FTA_TSE)
17.7.1 Family behaviour
17.7.2 Components leveling and description
17.7.3 Management of FTA_TSE.1
17.7.4 Audit of FTA_TSE.1
17.7.5 FTA_TSE.1 TOE session establishment <\/td>\n<\/tr>\n
154<\/td>\n18.1 Class description <\/td>\n<\/tr>\n
155<\/td>\n18.2 Inter-TSF trusted channel (FTP_ITC)
18.2.1 Family behaviour
18.2.2 Components leveling and description
18.2.3 Management of FTP_ITC.1
18.2.4 Audit of FTP_ITC.1
18.2.5 FTP_ITC.1 Inter-TSF trusted channel <\/td>\n<\/tr>\n
156<\/td>\n18.3 Trusted channel protocol (FTP_PRO)
18.3.1 Family behavior
18.3.2 Components leveling and description
18.3.3 Management of FTP_PRO.1
18.3.4 Management of FTP_PRO.2
18.3.5 Management of FTP_PRO.3 <\/td>\n<\/tr>\n
157<\/td>\n18.3.6 Audit of FTP_PRO.1
18.3.7 Audit of FTP_PRO.2
18.3.8 Audit of FTP_PRO.3
18.3.9 FTP_PRO.1 Trusted channel protocol <\/td>\n<\/tr>\n
158<\/td>\n18.3.10 FTP_PRO.2 Trusted channel establishment
18.3.11 FTP_PRO.3 Trusted channel data protection <\/td>\n<\/tr>\n
159<\/td>\n18.4 Trusted path (FTP_TRP)
18.4.1 Family behaviour
18.4.2 Components leveling and description
18.4.3 Management of FTP_TRP.1
18.4.4 Audit of FTP_TRP.1
18.4.5 FTP_TRP.1 Trusted path <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security, cybersecurity and privacy protection. Evaluation criteria for IT security – Security functional components<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n294<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":450567,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-450563","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/450563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/450567"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=450563"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=450563"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=450563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}