• There are no items in your cart

PD ISO/IEC TR 15443-1:2012

Current
Current

The latest, up-to-date edition.

Information technology. Security techniques. Security assurance framework Introduction and concepts
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

10-31-2013

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated Terms
5 Concepts of security assurance
6 The structure of security assurance
7 SACA techniques
8 SACA methods
9 CASCO
10 SACA Paradigms
11 Aspects of the composition of security assurance
Bibliography

Specifies terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles central to ISO/IEC TR 15443 across its user communities.

This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles central to ISO/IEC TR 15443 across its user communities. It provides information fundamental to users of ISO/IEC TR 15443-2.

Committee
IST/33
DevelopmentNote
Supersedes 03/652496 DC. (03/2005)
DocumentType
Standard
Pages
64
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC TR 15443-1:2012 Identical

ISO/IEC 17025:2005 General requirements for the competence of testing and calibration laboratories
ISO/IEC 17000:2004 Conformity assessment Vocabulary and general principles
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 17021:2011 Conformity assessment Requirements for bodies providing audit and certification of management systems
ISO/IEC 23988:2007 Information technology — A code of practice for the use of information technology (IT) in the delivery of assessments
ISO/IEC 19790:2012 Information technology Security techniques Security requirements for cryptographic modules
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC TR 15026-1:2010 Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary
ISO/IEC 17030:2003 Conformity assessment General requirements for third-party marks of conformity
ISO/IEC 17020:2012 Conformity assessment — Requirements for the operation of various types of bodies performing inspection
ISO/IEC TR 19791:2010 Information technology Security techniques Security assessment of operational systems
ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
ISO/IEC 15026-2:2011 Systems and software engineering — Systems and software assurance — Part 2: Assurance case
ISO/PAS 17005:2008 Conformity assessment Use of management systems Principles and requirements
ISO/IEC 27036-1:2014 Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts
ISO/IEC 17024:2012 Conformity assessment — General requirements for bodies operating certification of persons
ISO/IEC 17007:2009 Conformity assessment — Guidance for drafting normative documents suitable for use for conformity assessment
ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation
ISO/IEC 15026-3:2015 Systems and software engineering — Systems and software assurance — Part 3: System integrity levels

View more information
US$330.61
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.