Contents Foreword INTRODUCTION 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Overview 5.1 General 5.2 The TOE 5.3 Target audience of ISO/IEC 15408 5.4 The different parts of ISO/IEC 15408 5.5 Evaluation context 6 General model 6.1 Introduction 6.2 Assets and countermeasures 6.3 Evaluation 7 Tailoring Security Requirements 7.1 Operations 7.2 Dependencies between components 7.3 Extended components 8 Protection Profiles and Packages 8.1 Introduction 8.2 Packages 8.3 Protection Profiles 8.4 Using PPs and packages 8.5 Using Multiple Protection Profiles 9 Evaluation results 9.1 Introduction 9.2 Results of a PP evaluation 9.3 Results of an ST/TOE evaluation 9.4 Conformance claim 9.5 Use of ST/TOE evaluation results Annex A (Informative) Specification of Security Targets Annex B (Informative) Specification of Protection Profiles Annex C (Informative) Guidance for Operations Annex D (Informative) PP conformance Bibliography |