{"id":450563,"date":"2024-10-20T09:11:55","date_gmt":"2024-10-20T09:11:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-15408-22023\/"},"modified":"2024-10-26T17:09:22","modified_gmt":"2024-10-26T17:09:22","slug":"bs-en-iso-iec-15408-22023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-15408-22023\/","title":{"rendered":"BS EN ISO\/IEC 15408-2:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.1 General 5.2 Organization of this document <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.1 Overview 7.1.1 General 7.1.2 Class structure <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.1.3 Family structure <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.1.4 Component structure <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.2 Component catalogue <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 8.1 Class description <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.2 Security audit automatic response (FAU_ARP) 8.2.1 Family behaviour 8.2.2 Components leveling and description 8.2.3 Management of FAU_ARP.1 8.2.4 Audit of FAU_ARP.1 8.2.5 FAU_ARP.1 Security alarms 8.3 Security audit data generation (FAU_GEN) 8.3.1 Family behaviour 8.3.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8.3.3 Management of FAU_GEN.1, FAU_GEN.2 8.3.4 Audit of FAU_GEN.1, FAU_GEN.2 8.3.5 FAU_GEN.1 Audit data generation 8.3.6 FAU_GEN.2 User identity association <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 8.4 Security audit analysis (FAU_SAA) 8.4.1 Family behaviour 8.4.2 Components leveling and description 8.4.3 Management of FAU_SAA.1 <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 8.4.4 Management of FAU_SAA.2 8.4.5 Management of FAU_SAA.3 8.4.6 Management of FAU_SAA.4 8.4.7 Audit of FAU_SAA.1, FAU_SAA.2, FAU_SAA.3, FAU_SAA.4 8.4.8 FAU_SAA.1 Potential violation analysis 8.4.9 FAU_SAA.2 Profile based anomaly detection <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 8.4.10 FAU_SAA.3 Simple attack heuristics 8.4.11 FAU_SAA.4 Complex attack heuristics <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 8.5 Security audit review (FAU_SAR) 8.5.1 Family behaviour 8.5.2 Components leveling and description 8.5.3 Management of FAU_SAR.1 8.5.4 Management of FAU_SAR.2, FAU_SAR.3 8.5.5 Audit of FAU_SAR.1 <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 8.5.6 Audit of FAU_SAR.2 8.5.7 Audit of FAU_SAR.3 8.5.8 FAU_SAR.1 Audit review 8.5.9 FAU_SAR.2 Restricted audit review 8.5.10 FAU_SAR.3 Selectable audit review <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.6 Security audit event selection (FAU_SEL) 8.6.1 Family behaviour 8.6.2 Components leveling and description 8.6.3 Management of FAU_SEL.1 8.6.4 Audit of FAU_SEL.1 8.6.5 FAU_SEL.1 Selective audit 8.7 Security audit data storage (FAU_STG) 8.7.1 Family behaviour <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 8.7.2 Components leveling and description 8.7.3 Management of FAU_STG.1 8.7.4 Management of FAU_STG.2 8.7.5 Management of FAU_STG.3 8.7.6 Management of FAU_STG.4 8.7.7 Management of FAU_STG.5 <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 8.7.8 Audit of FAU_STG.1 8.7.9 Audit of FAU_STG.2, FAU_STG.3 8.7.10 Audit of FAU_STG.4 8.7.11 Audit of FAU_STG.5 8.7.12 FAU_STG.1 Audit data storage location 8.7.13 FAU_STG.2 Protected audit data storage <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 8.7.14 FAU_STG.3 Guarantees of audit data availability 8.7.15 FAU_STG.4 Action in case of possible audit data loss 8.7.16 FAU_STG.5 Prevention of audit data loss 9.1 Class description <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 9.2 Non-repudiation of origin (FCO_NRO) 9.2.1 Family behaviour 9.2.2 Components leveling and description 9.2.3 Management of FCO_NRO.1, FCO_NRO.2 9.2.4 Audit of FCO_NRO.1 <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 9.2.5 Audit of FCO_NRO.2 9.2.6 FCO_NRO.1 Selective proof of origin 9.2.7 FCO_NRO.2 Enforced proof of origin <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 9.3 Non-repudiation of receipt (FCO_NRR) 9.3.1 Family behaviour 9.3.2 Components leveling and description 9.3.3 Management of FCO_NRR.1, FCO_NRR.2 9.3.4 Audit of FCO_NRR.1 9.3.5 Audit of FCO_NRR.2 <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 9.3.6 FCO_NRR.1 Selective proof of receipt 9.3.7 FCO_NRR.2 Enforced proof of receipt 10.1 Class description <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 10.2 Cryptographic key management (FCS_CKM) 10.2.1 Family behaviour 10.2.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 10.2.3 Management of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6 10.2.4 Audit of FCS_CKM.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.5, CKM.6 10.2.5 FCS_CKM.1 Cryptographic key generation <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 10.2.6 FCS_CKM.2 Cryptographic key distribution 10.2.7 FCS_CKM.3 Cryptographic key access 10.2.8 FCS_CKM.4 Cryptographic key destruction <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 10.2.9 FCS_CKM.5 Cryptographic key derivation 10.2.10 FCS_CKM.6 Timing and event of cryptographic key destruction 10.3 Cryptographic operation (FCS_COP) 10.3.1 Family behaviour 10.3.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 10.3.3 Management of FCS_COP.1 10.3.4 Audit of FCS_COP.1 10.3.5 FCS_COP.1 Cryptographic operation 10.4 Random bit generation (FCS_RBG) 10.4.1 Family behaviour 10.4.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 10.4.3 Management of FCS_RBG.1, FCS_RBG.2, FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RBG.6 10.4.4 Audit of FCS_RBG.1, FCS_RBG.2 10.4.5 Audit of FCS_RBG.3, FCS_RBG.4, FCS_RBG.5, FCS_RBG.6 10.4.6 FCS_RBG.1 Random bit generation (RBG) <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 10.4.7 FCS_RBG.2 Random bit generation (external seeding) 10.4.8 FCS_RBG.3 Random bit generation (internal seeding \u2013 single source) <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 10.4.9 FCS_RBG.4 Random bit generation (internal seeding \u2013 multiple sources) 10.4.10 FCS_RBG.5 Random bit generation (combining noise sources) 10.4.11 FCS_RBG.6 Random bit generation service 10.5 Generation of random numbers (FCS_RNG) 10.5.1 Family behaviour <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 10.5.2 Components leveling and description 10.5.3 Management of FCS_RNG.1 10.5.4 Audit of FCS_RNG.1 10.5.5 FCS_RNG.1 Random number generation 11.1 Class description <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 11.2 Access control policy (FDP_ACC) 11.2.1 Family behaviour <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 11.2.2 Components leveling and description 11.2.3 Management of FDP_ACC.1, FDP_ACC.2 11.2.4 Audit of FDP_ACC.1, FDP_ACC.2 11.2.5 FDP_ACC.1 Subset access control 11.2.6 FDP_ACC.2 Complete access control <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 11.3 Access control functions (FDP_ACF) 11.3.1 Family behaviour 11.3.2 Components leveling and description 11.3.3 Management of FDP_ACF.1 11.3.4 Audit of FDP_ACF.1 11.3.5 FDP_ACF.1 Security attribute-based access control <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 11.4 Data authentication (FDP_DAU) 11.4.1 Family behaviour 11.4.2 Components leveling and description 11.4.3 Management of FDP_DAU.1, FDP_DAU.2 11.4.4 Audit of FDP_DAU.1 <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 11.4.5 Audit of FDP_DAU.2 11.4.6 FDP_DAU.1 Basic Data Authentication 11.4.7 FDP_DAU.2 Data Authentication with Identity of Guarantor 11.5 Export from the TOE (FDP_ETC) 11.5.1 Family behaviour <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 11.5.2 Components leveling and description 11.5.3 Management of FDP_ETC.1 11.5.4 Management of FDP_ETC.2 11.5.5 Audit of FDP_ETC.1, FDP_ETC.2 11.5.6 FDP_ETC.1 Export of user data without security attributes 11.5.7 FDP_ETC.2 Export of user data with security attributes <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 11.6 Information flow control policy (FDP_IFC) 11.6.1 Family behaviour 11.6.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 11.6.3 Management of FDP_IFC.1, FDP_IFC.2 11.6.4 Audit of FDP_IFC.1, FDP_IFC.2 11.6.5 FDP_IFC.1 Subset information flow control 11.6.6 FDP_IFC.2 Complete information flow control 11.7 Information flow control functions (FDP_IFF) 11.7.1 Family behaviour <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 11.7.2 Components leveling and description 11.7.3 Management of FDP_IFF.1, FDP_IFF.2 11.7.4 Management of FDP_IFF.3, FDP_IFF.4, FDP_IFF.5 <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 11.7.5 Management of FDP_IFF.6 11.7.6 Audit of FDP_IFF.1, FDP_IFF.2, FDP_IFF.5 11.7.7 Audit of FDP_IFF.3, FDP_IFF.4, FDP_IFF.6 11.7.8 FDP_IFF.1 Simple security attributes <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 11.7.9 FDP_IFF.2 Hierarchical security attributes <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 11.7.10 FDP_IFF.3 Limited illicit information flows 11.7.11 FDP_IFF.4 Partial elimination of illicit information flows 11.7.12 FDP_IFF.5 No illicit information flows 11.7.13 FDP_IFF.6 Illicit information flow monitoring <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 11.8 Information Retention Control (FDP_IRC) 11.8.1 Family behaviour 11.8.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 11.8.3 Management of FDP_IRC.1 11.8.4 Audit of FDP_IRC.1 11.8.5 FDP_IRC.1 Information retention control 11.9 Import from outside of the TOE (FDP_ITC) 11.9.1 Family behaviour 11.9.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 11.9.3 Management of FDP_ITC.1, FDP_ITC.2 11.9.4 Audit of FDP_ITC.1, FDP_ITC.2 11.9.5 FDP_ITC.1 Import of user data without security attributes 11.9.6 FDP_ITC.2 Import of user data with security attributes <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 11.10 Internal TOE transfer (FDP_ITT) 11.10.1 Family behaviour 11.10.2 Components leveling and description 11.10.3 Management of FDP_ITT.1, FDP_ITT.2 <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 11.10.4 Management of FDP_ITT.3, FDP_ITT.4 11.10.5 Audit of FDP_ITT.1, FDP_ITT.2 11.10.6 Audit of FDP_ITT.3, FDP_ITT.4 11.10.7 FDP_ITT.1 Basic internal transfer protection 11.10.8 FDP_ITT.2 Transmission separation by attribute <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 11.10.9 FDP_ITT.3 Integrity monitoring 11.10.10 FDP_ITT.4 Attribute-based integrity monitoring 11.11 Residual information protection (FDP_RIP) 11.11.1 Family behaviour <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 11.11.2 Components leveling and description 11.11.3 Management of FDP_RIP.1, FDP_RIP.2 11.11.4 Audit of FDP_RIP.1, FDP_RIP.2 11.11.5 FDP_RIP.1 Subset residual information protection 11.11.6 FDP_RIP.2 Full residual information protection <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 11.12 Rollback (FDP_ROL) 11.12.1 Family behaviour 11.12.2 Components leveling and description 11.12.3 Management of FDP_ROL.1, FDP_ROL.2 11.12.4 Audit of FDP_ROL.1, FDP_ROL.2 11.12.5 FDP_ROL.1 Basic rollback <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 11.12.6 FDP_ROL.2 Advanced rollback 11.13 Stored data confidentiality (FDP_SDC) 11.13.1 Family behaviour 11.13.2 Components leveling and description 11.13.3 Management of FDP_SDC.1, FDP_SDC.2 <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 11.13.4 Audit of FDP_SDC.1, FDP_SDC.2 11.13.5 FDP_SDC.1 Stored data confidentiality 11.13.6 FDP_SDC.2 Stored data confidentiality with dedicated method 11.14 Stored data integrity (FDP_SDI) 11.14.1 Family behaviour 11.14.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 11.14.3 Management of FDP_SDI.1 11.14.4 Management of FDP_SDI.2 11.14.5 Audit of FDP_SDI.1 11.14.6 Audit of FDP_SDI.2 11.14.7 FDP_SDI.1 Stored data integrity monitoring 11.14.8 FDP_SDI.2 Stored data integrity monitoring and action <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 11.15 Inter-TSF user data confidentiality transfer protection (FDP_UCT) 11.15.1 Family behaviour 11.15.2 Components leveling and description 11.15.3 Management of FDP_UCT.1 11.15.4 Audit of FDP_UCT.1 11.15.5 FDP_UCT.1 Basic data exchange confidentiality <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 11.16 Inter-TSF user data integrity transfer protection (FDP_UIT) 11.16.1 Family behaviour 11.16.2 Components leveling and description 11.16.3 Management of FDP_UIT.1, FDP_UIT.2, FDP_UIT.3 11.16.4 Audit of FDP_UIT.1 <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 11.16.5 Audit of FDP_UIT.2, FDP_UIT.3 11.16.6 FDP_UIT.1 Data exchange integrity 11.16.7 FDP_UIT.2 Source data exchange recovery <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 11.16.8 FDP_UIT.3 Destination data exchange recovery 12.1 Class description <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 12.2 Authentication failures (FIA_AFL) 12.2.1 Family behaviour 12.2.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 12.2.3 Management of FIA_AFL.1 12.2.4 Audit of FIA_AFL.1 12.2.5 FIA_AFL.1 Authentication failure handling 12.3 Authentication proof of identity (FIA_API) 12.3.1 Family behaviour 12.3.2 Components leveling and description 12.3.3 Management of FIA_API.1 <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 12.3.4 Audit of FIA_API.1 12.3.5 FIA_API.1 Authentication proof of identity 12.4 User attribute definition (FIA_ATD) 12.4.1 Family behaviour 12.4.2 Components leveling and description 12.4.3 Management of FIA_ATD.1 12.4.4 Audit of FIA_ATD.1 12.4.5 FIA_ATD.1 User attribute definition <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 12.5 Specification of secrets (FIA_SOS) 12.5.1 Family behaviour 12.5.2 Components leveling and description 12.5.3 Management of FIA_SOS.1 12.5.4 Management of FIA_SOS.2 12.5.5 Audit of FIA_SOS.1, FIA_SOS.2 12.5.6 FIA_SOS.1 Verification of secrets <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 12.5.7 FIA_SOS.2 TSF Generation of secrets 12.6 User authentication (FIA_UAU) 12.6.1 Family behaviour 12.6.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 12.6.3 Management of FIA_UAU.1 12.6.4 Management of FIA_UAU.2 12.6.5 Management of FIA_UAU.3, FIA_UAU.4, FIA_UAU.7 12.6.6 Management of FIA_UAU.5 12.6.7 Management of FIA_UAU.6 12.6.8 Management of FIA_UAU.7 12.6.9 Audit of FIA_UAU.1 <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 12.6.10 Audit of FIA_UAU.2 12.6.11 Audit of FIA_UAU.3 12.6.12 Audit of FIA_UAU.4 12.6.13 Audit of FIA_UAU.5 12.6.14 Audit of FIA_UAU.6 12.6.15 Audit of FIA_UAU.7 12.6.16 FIA_UAU.1 Timing of authentication <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 12.6.17 FIA_UAU.2 User authentication before any action 12.6.18 FIA_UAU.3 Unforgeable authentication 12.6.19 FIA_UAU.4 Single-use authentication mechanisms 12.6.20 FIA_UAU.5 Multiple authentication mechanisms <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 12.6.21 FIA_UAU.6 Re-authenticating 12.6.22 FIA_UAU.7 Protected authentication feedback 12.7 User identification (FIA_UID) 12.7.1 Family behaviour 12.7.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 12.7.3 Management of FIA_UID.1 12.7.4 Management of FIA_UID.2 12.7.5 Audit of FIA_UID.1, FIA_UID.2 12.7.6 FIA_UID.1 Timing of identification 12.7.7 FIA_UID.2 User identification before any action <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 12.8 User-subject binding (FIA_USB) 12.8.1 Family behaviour 12.8.2 Components leveling and description 12.8.3 Management of FIA_USB.1 12.8.4 Audit of FIA_USB.1 12.8.5 FIA_USB.1 User-subject binding <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 13.1 Class description <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 13.2 Limited capabilities and availability (FMT_LIM) 13.2.1 Family behaviour 13.2.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 13.2.3 Management of FMT_LIM.1, FMT_LIM.2 13.2.4 Audit of FMT_LIM.1 13.2.5 FMT_LIM.1 Limited capabilities 13.2.6 FMT_LIM.2 Limited availability 13.3 Management of functions in TSF (FMT_MOF) 13.3.1 Family behaviour 13.3.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 13.3.3 Management of FMT_MOF.1 13.3.4 Audit of FMT_MOF.1 13.3.5 FMT_MOF.1 Management of security functions behaviour 13.4 Management of security attributes (FMT_MSA) 13.4.1 Family behaviour 13.4.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 13.4.3 Management of FMT_MSA.1 13.4.4 Management of FMT_MSA.2 13.4.5 Management of FMT_MSA.3 13.4.6 Management of FMT_MSA.4 13.4.7 Audit of FMT_MSA.1 13.4.8 Audit of FMT_MSA.2 13.4.9 Audit of FMT_MSA.3 <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 13.4.10 Audit of FMT_MSA.4 13.4.11 FMT_MSA.1 Management of security attributes 13.4.12 FMT_MSA.2 Secure security attributes 13.4.13 FMT_MSA.3 Static attribute initialization <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 13.4.14 FMT_MSA.4 Security attribute value inheritance 13.5 Management of TSF data (FMT_MTD) 13.5.1 Family behaviour 13.5.2 Components leveling and description 13.5.3 Management of FMT_MTD.1 13.5.4 Management of FMT_MTD.2 <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 13.5.5 Management of FMT_MTD.3 13.5.6 Audit of FMT_MTD.1 13.5.7 Audit of FMT_MTD.2 13.5.8 Audit of FMT_MTD.3 13.5.9 FMT_MTD.1 Management of TSF data 13.5.10 FMT_MTD.2 Management of limits on TSF data <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 13.5.11 FMT_MTD.3 Secure TSF data 13.6 Revocation (FMT_REV) 13.6.1 Family behaviour 13.6.2 Components leveling and description 13.6.3 Management of FMT_REV.1 13.6.4 Audit of FMT_REV.1 13.6.5 FMT_REV.1 Revocation <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 13.7 Security attribute expiration (FMT_SAE) 13.7.1 Family behaviour 13.7.2 Components leveling and description 13.7.3 Management of FMT_SAE.1 13.7.4 Audit of FMT_SAE.1 13.7.5 FMT_SAE.1 Time-limited authorization <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 13.8 Specification of Management Functions (FMT_SMF) 13.8.1 Family behaviour 13.8.2 Components leveling and description 13.8.3 Management of FMT_SMF.1 13.8.4 Audit of FMT_SMF.1 13.8.5 FMT_SMF.1 Specification of Management Functions <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 13.9 Security management roles (FMT_SMR) 13.9.1 Family behaviour 13.9.2 Components leveling and description 13.9.3 Management of FMT_SMR.1 13.9.4 Management of FMT_SMR.2 13.9.5 Management of FMT_SMR.3 13.9.6 Audit of FMT_SMR.1 13.9.7 Audit of FMT_SMR.2 <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 13.9.8 Audit of FMT_SMR.3 13.9.9 FMT_SMR.1 Security roles 13.9.10 FMT_SMR.2 Restrictions on security roles 13.9.11 FMT_SMR.3 Assuming roles <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 14.1 Class description 14.2 Anonymity (FPR_ANO) 14.2.1 Family behaviour 14.2.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 14.2.3 Management of FPR_ANO.1, FPR_ANO.2 14.2.4 Audit of FPR_ANO.1, FPR_ANO.2 14.2.5 FPR_ANO.1 Anonymity 14.2.6 FPR_ANO.2 Anonymity without soliciting information 14.3 Pseudonymity (FPR_PSE) 14.3.1 Family behaviour 14.3.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 14.3.3 Management of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3 14.3.4 Audit of FPR_PSE.1, FPR_PSE.2, FPR_PSE.3 14.3.5 FPR_PSE.1 Pseudonymity 14.3.6 FPR_PSE.2 Reversible pseudonymity <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 14.3.7 FPR_PSE.3 Alias pseudonymity 14.4 Unlinkability (FPR_UNL) 14.4.1 Family behaviour 14.4.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 14.4.3 Management of FPR_UNL.1 14.4.4 Audit of FPR_UNL.1 14.4.5 FPR_UNL.1 Unlinkability of operations 14.5 Unobservability (FPR_UNO) 14.5.1 Family behaviour 14.5.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | 14.5.3 Management of FPR_UNO.1, FPR_UNO.2 14.5.4 Management of FPR_UNO.3 14.5.5 Management of FPR_UNO.4 14.5.6 Audit of FPR_UNO.1, FPR_UNO.2 14.5.7 Audit of FPR_UNO.3 14.5.8 Audit of FPR_UNO.4 <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 14.5.9 FPR_UNO.1 Unobservability 14.5.10 FPR_UNO.2 Allocation of information impacting unobservability 14.5.11 FPR_UNO.3 Unobservability without soliciting information 14.5.12 FPR_UNO.4 Authorized user observability <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 15.1 Class description <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 15.2 TOE emanation (FPT_EMS) 15.2.1 Family behaviour <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 15.2.2 Components leveling and description 15.2.3 Management of FPT_EMS.1 15.2.4 Audit of FPT_EMS.1 15.2.5 FPT_EMS.1 Emanation of TSF and User data 15.3 Fail secure (FPT_FLS) 15.3.1 Family behaviour <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 15.3.2 Components leveling and description 15.3.3 Management of FPT_FLS.1 15.3.4 Audit of FPT_FLS.1 15.3.5 FPT_FLS.1 Failure with preservation of secure state 15.4 TSF initialization (FPT_INI) 15.4.1 Family behaviour 15.4.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 15.4.3 Management of FPT_INI.1 15.4.4 Audit of FPT_INI.1 15.4.5 FPT_INI.1 TSF initialization 15.5 Availability of exported TSF data (FPT_ITA) 15.5.1 Family behaviour 15.5.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 15.5.3 Management of FPT_ITA.1 15.5.4 Audit of FPT_ITA.1 15.5.5 FPT_ITA.1 Inter-TSF availability within a defined availability metric 15.6 Confidentiality of exported TSF data (FPT_ITC) 15.6.1 Family behaviour 15.6.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 15.6.3 Management of FPT_ITC.1 15.6.4 Audit of FPT_ITC.1 15.6.5 FPT_ITC.1 Inter-TSF confidentiality during transmission 15.7 Integrity of exported TSF data (FPT_ITI) 15.7.1 Family behaviour 15.7.2 Components leveling and description 15.7.3 Management of FPT_ITI.1 <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 15.7.4 Management of FPT_ITI.2 15.7.5 Audit of FPT_ITI.1 15.7.6 Audit of FPT_ITI.2 15.7.7 FPT_ITI.1 Inter-TSF detection of modification 15.7.8 FPT_ITI.2 Inter-TSF detection and correction of modification <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | 15.8 Internal TOE TSF data transfer (FPT_ITT) 15.8.1 Family behaviour 15.8.2 Components leveling and description 15.8.3 Management of FPT_ITT.1 15.8.4 Management of FPT_ITT.2 <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | 15.8.5 Management of FPT_ITT.3 15.8.6 Audit of FPT_ITT.1, FPT_ITT.2 15.8.7 Audit of FPT_ITT.3 15.8.8 FPT_ITT.1 Basic internal TSF data transfer protection 15.8.9 FPT_ITT.2 TSF data transfer separation <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 15.8.10 FPT_ITT.3 TSF data integrity monitoring 15.9 TSF physical protection (FPT_PHP) 15.9.1 Family behaviour 15.9.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 15.9.3 Management of FPT_PHP.1 15.9.4 Management of FPT_PHP.2 15.9.5 Management of FPT_PHP.3 15.9.6 Audit of FPT_PHP.1 15.9.7 Audit of FPT_PHP.2 15.9.8 Audit of FPT_PHP.3 15.9.9 FPT_PHP.1 Passive detection of physical attack <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | 15.9.10 FPT_PHP.2 Notification of physical attack 15.9.11 FPT_PHP.3 Resistance to physical attack 15.10 Trusted recovery (FPT_RCV) 15.10.1 Family behaviour 15.10.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 15.10.3 Management of FPT_RCV.1 15.10.4 Management of FPT_RCV.2, FPT_RCV.3 15.10.5 Management of FPT_RCV.4 15.10.6 Audit of FPT_RCV.1, FPT_RCV.2, FPT_RCV.3 15.10.7 Audit of FPT_RCV.4 15.10.8 FPT_RCV.1 Manual recovery <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 15.10.9 FPT_RCV.2 Automated recovery 15.10.10 FPT_RCV.3 Automated recovery without undue loss 15.10.11 FPT_RCV.4 Function recovery <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | 15.11 Replay detection (FPT_RPL) 15.11.1 Family behaviour 15.11.2 Components leveling and description 15.11.3 Management of FPT_RPL.1 15.11.4 Audit of FPT_RPL.1 15.11.5 FPT_RPL.1 Replay detection <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | 15.12 State synchrony protocol (FPT_SSP) 15.12.1 Family behaviour 15.12.2 Components leveling and description 15.12.3 Management of FPT_SSP.1, FPT_SSP.2 15.12.4 Audit of FPT_SSP.1, FPT_SSP.2 15.12.5 FPT_SSP.1 Simple trusted acknowledgement 15.12.6 FPT_SSP.2 Mutual trusted acknowledgement <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | 15.13 Time stamps (FPT_STM) 15.13.1 Family behaviour 15.13.2 Components leveling and description 15.13.3 Management of FPT_STM.1 15.13.4 Management of FPT_STM.2 15.13.5 Audit of FPT_STM.1 15.13.6 Audit of FPT_STM.2 <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | 15.13.7 FPT_STM.1 Reliable time stamps 15.13.8 FPT_STM.2 Time source 15.14 Inter-TSF TSF data consistency (FPT_TDC) 15.14.1 Family behaviour 15.14.2 Components leveling and description 15.14.3 Management of FPT_TDC.1 <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | 15.14.4 Audit of FPT_TDC.1 15.14.5 FPT_TDC.1 Inter-TSF basic TSF data consistency 15.15 Testing of external entities (FPT_TEE) 15.15.1 Family behaviour 15.15.2 Components leveling and description 15.15.3 Management of FPT_TEE.1 <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 15.15.4 Audit of FPT_TEE.1 15.15.5 FPT_TEE.1 Testing of external entities 15.16 Internal TOE TSF data replication consistency (FPT_TRC) 15.16.1 Family behaviour 15.16.2 Components leveling and description 15.16.3 Management of FPT_TRC.1 <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | 15.16.4 Audit of FPT_TRC.1 15.16.5 FPT_TRC.1 Internal TSF consistency 15.17 TSF self-test (FPT_TST) 15.17.1 Family behaviour 15.17.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 15.17.3 Management of FPT_TST.1 15.17.4 Audit of FPT_TST.1 15.17.5 FPT_TST.1 TSF self-testing 16.1 Class description <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | 16.2 Fault tolerance (FRU_FLT) 16.2.1 Family behaviour 16.2.2 Components leveling and description 16.2.3 Management of FRU_FLT.1, FRU_FLT.2 16.2.4 Audit of FRU_FLT.1 16.2.5 Audit of FRU_FLT.2 <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | 16.2.6 FRU_FLT.1 Degraded fault tolerance 16.2.7 FRU_FLT.2 Limited fault tolerance 16.3 Priority of service (FRU_PRS) 16.3.1 Family behaviour 16.3.2 Components leveling and description 16.3.3 Management of FRU_PRS.1, FRU_PRS.2 <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | 16.3.4 Audit of FRU_PRS.1, FRU_PRS.2 16.3.5 FRU_PRS.1 Limited priority of service 16.3.6 FRU_PRS.2 Full priority of service 16.4 Resource allocation (FRU_RSA) 16.4.1 Family behaviour 16.4.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 16.4.3 Management of FRU_RSA.1 16.4.4 Management of FRU_RSA.2 16.4.5 Audit of FRU_RSA.1, FRU_RSA.2 16.4.6 FRU_RSA.1 Maximum quotas 16.4.7 FRU_RSA.2 Minimum and maximum quotas <\/td>\n<\/tr>\n | ||||||
146<\/td>\n | 17.1 Class description 17.2 Limitation on scope of selectable attributes (FTA_LSA) 17.2.1 Family behaviour 17.2.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | 17.2.3 Management of FTA_LSA.1 17.2.4 Audit of FTA_LSA.1 17.2.5 FTA_LSA.1 Limitation on scope of selectable attributes 17.3 Limitation on multiple concurrent sessions (FTA_MCS) 17.3.1 Family behaviour 17.3.2 Components leveling and description <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | 17.3.3 Management of FTA_MCS.1 17.3.4 Management of FTA_MCS.2 17.3.5 Audit of FTA_MCS.1, FTA_MCS.2 17.3.6 FTA_MCS.1 Basic limitation on multiple concurrent sessions 17.3.7 FTA_MCS.2 Per user attribute limitation on multiple concurrent sessions <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | 17.4 Session locking and termination (FTA_SSL) 17.4.1 Family behaviour 17.4.2 Components leveling and description 17.4.3 Management of FTA_SSL.1 17.4.4 Management of FTA_SSL.2 17.4.5 Management of FTA_SSL.3 <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | 17.4.6 Management of FTA_SSL.4 17.4.7 Audit of FTA_SSL.1, FTA_SSL.2 17.4.8 Audit of FTA_SSL.3 17.4.9 Audit of FTA_SSL.4 17.4.10 FTA_SSL.1 TSF-initiated session locking 17.4.11 FTA_SSL.2 User-initiated locking <\/td>\n<\/tr>\n | ||||||
151<\/td>\n | 17.4.12 FTA_SSL.3 TSF-initiated termination 17.4.13 FTA_SSL.4 User-initiated termination 17.5 TOE access banners (FTA_TAB) 17.5.1 Family behaviour 17.5.2 Components leveling and description 17.5.3 Management of FTA_TAB.1 <\/td>\n<\/tr>\n | ||||||
152<\/td>\n | 17.5.4 Audit of FTA_TAB.1 17.5.5 FTA_TAB.1 Default TOE access banners 17.6 TOE access history (FTA_TAH) 17.6.1 Family behaviour 17.6.2 Components leveling and description 17.6.3 Management of FTA_TAH.1 17.6.4 Audit of FTA_TAH.1 17.6.5 FTA_TAH.1 TOE access history <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | 17.7 TOE session establishment (FTA_TSE) 17.7.1 Family behaviour 17.7.2 Components leveling and description 17.7.3 Management of FTA_TSE.1 17.7.4 Audit of FTA_TSE.1 17.7.5 FTA_TSE.1 TOE session establishment <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | 18.1 Class description <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | 18.2 Inter-TSF trusted channel (FTP_ITC) 18.2.1 Family behaviour 18.2.2 Components leveling and description 18.2.3 Management of FTP_ITC.1 18.2.4 Audit of FTP_ITC.1 18.2.5 FTP_ITC.1 Inter-TSF trusted channel <\/td>\n<\/tr>\n | ||||||
156<\/td>\n | 18.3 Trusted channel protocol (FTP_PRO) 18.3.1 Family behavior 18.3.2 Components leveling and description 18.3.3 Management of FTP_PRO.1 18.3.4 Management of FTP_PRO.2 18.3.5 Management of FTP_PRO.3 <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | 18.3.6 Audit of FTP_PRO.1 18.3.7 Audit of FTP_PRO.2 18.3.8 Audit of FTP_PRO.3 18.3.9 FTP_PRO.1 Trusted channel protocol <\/td>\n<\/tr>\n | ||||||
158<\/td>\n | 18.3.10 FTP_PRO.2 Trusted channel establishment 18.3.11 FTP_PRO.3 Trusted channel data protection <\/td>\n<\/tr>\n | ||||||
159<\/td>\n | 18.4 Trusted path (FTP_TRP) 18.4.1 Family behaviour 18.4.2 Components leveling and description 18.4.3 Management of FTP_TRP.1 18.4.4 Audit of FTP_TRP.1 18.4.5 FTP_TRP.1 Trusted path <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Evaluation criteria for IT security – Security functional components<\/b><\/p>\n |