Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - P...
This document defines the assurance requirements of the ISO/IEC 15408 series. It includes the individual assurance components from which the evaluation assurance levels and other packages contained in ISO/IEC 15408-5 are composed, and the criteria for evaluation of Protection Profiles (PPs), PP-Configurations, PP-Modules, and Security Targets (STs).
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - M...
This document defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 series evaluation, using the criteria and evaluation evidence defined in the ISO/IEC 15408 series.
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document defines the assurance requirements of the ISO/IEC 15408 series. It includes the individual assurance components from which the evaluation assurance levels and other packages contained in ISO/IEC 15408-5 are composed, and the criteria for evaluation of Protection Profiles (PPs), PP-Configurations, PP-Modules, and Security Targets (STs).
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.
This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts of the…
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document provides a standardized framework for specifying objective, repeatable and reproducible evaluation methods and evaluation activities.
This document does not specify how to evaluate, adopt, or maintain evaluation methods and evaluation activities. These aspects are a matter for those originating the evaluation methods and evaluation activities in their particular area of interest.
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that meets the common security functionality requirements of many IT products.
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — M...
This document defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 series evaluation, using the criteria and evaluation evidence defined in the ISO/IEC 15408 series.
Sécurité de l'information, cybersécurité et protection de la vie privée — Critères d'évalu...
Le présent document définit les actions minimales à réaliser par un évaluateur pour mener une évaluation selon la série de normes ISO/IEC 15408 en utilisant les critères et les preuves d'évaluation définis dans la série de normes ISO/IEC 15408.
Unmanned aircraft systems — Part 2: Operation of vertiports for vertical take-off and landing (VTOL)...
This document specifies the requirements for vertiport operations (e.g. removal of contaminants, noise) and interface with an unmanned aircraft system (UAS) or vertical take-off and landing (VTOL) aircraft operators and with UAS traffic management (UTM) service providers (SPs).
This document is applicable to operations of vertiports belonging to any type, supporting:
a) demonstration of…
Information technology - JPEG XL image coding system - Part 4: Reference software
This document provides reference implementations of ISO/IEC 18181-1 and ISO/IEC 18181-2. The software supports lossless and lossy compression of images and image sequences for a wide range of use cases such as (but not limited to) images with wide colour gamut and/or high dynamic range and responsive web images. This document includes source code and instructions for compilation and usage.