Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope
This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.
This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts…
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope
This document defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that meets the common security functionality requirements of many IT products.
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope
This document defines the assurance requirements of the ISO/IEC 15408 series. It includes the individual assurance components from which the evaluation assurance levels and other packages contained in ISO/IEC 15408-5 are composed, and the criteria for evaluation of Protection Profiles (PPs), PP-Configurations, PP-Modules, and Security Targets (STs).
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
Scope
This document provides a standardized framework for specifying objective, repeatable and reproducible evaluation methods and evaluation activities.This document does not specify how to evaluate, adopt, or maintain evaluation methods and evaluation activities. These aspects are a matter for those originating the evaluation methods and evaluation activities in their particular area of…
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope
This document provides packages of security assurance and security functional requirements that have been identified as useful in support of common usage by stakeholders.
EXAMPLE Examples of provided packages include the evaluation assurance levels (EAL) and the composed assurance packages (CAPs).
This document presents:
— evaluation assurance level (EAL) family of packages that…
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — M...
Scope
This document defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 series evaluation, using the criteria and evaluation evidence defined in the ISO/IEC 15408 series.
Information technology — Guidance for the use of database language SQL — Part 9: Online analytic pro...
1 Scope
This document discusses the syntax and semantics for including online analytic processing (OLAP) capabilities
in SQL, as defined in ISO/IEC 9075-2.
It discusses the following features regarding OLAP capabilities of the SQL language:
— Feature T611, “Elementary OLAP operations”,
— Feature T612, “Advanced OLAP operations”,
— Feature T614, “NTILE function”,
— Feature T615, “LEAD and…
Information security — Anonymous entity authentication — Part 3: Mechanisms based on blind signature...
1 Scope
This document provides general descriptions and specifications of anonymous entity authentication mechanisms based on blind digital signatures.
Information technology — Artificial intelligence — Artificial intelligence concepts and terminology
1 Scope
This document establishes terminology for AI and describes concepts in the field of AI.
This document can be used in the development of other standards and in support of communications among diverse, interested parties or stakeholders.
This document is applicable to all types of organizations (e.g. commercial enterprises, government agencies, not-for-profit organizations).
Information technology — DevOps — Building reliable and secure systems including application build, ...
1.1 Scope
This document provides requirements and guidance on the implementation of DevOps to define, control,
and improve software life cycle processes. It applies within an organization or a project to build, package,
and deploy software and systems in a secure and reliable way. This document specifies practices to
collaborate and communicate effectively in groups including development,…