• There are no items in your cart

EG 202 387 : 1.1.1

Current
Current

The latest, up-to-date edition.

TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
Available format(s)

Hardcopy , PDF

Language(s)

English

Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Security in standardization
  4.1 Communications security model
  4.2 Standards review and evaluation
  4.3 Overall development process
  4.4 Protocol standards containing security-related requirements
5 Overview of ISO/IEC 15408
  5.1 Introduction to the Common Criteria (CC)
  5.2 Overview of CC documents
  5.3 ETSI standards in the evaluation of CC
6 Evaluation components in ISO/IEC-15408-3
  6.1 Introduction
  6.2 Configuration management
  6.3 Delivery and operation
  6.4 Development
  6.5 Guidance documents
  6.6 Life cycle support
  6.7 Tests
  6.8 Vulnerability assessment
  6.9 Maintenance of assurance
Annex A (normative): Functional components in ISO/IEC-15408-2
      A.1 Introduction
      A.2 Security audit
      A.3 Communication
      A.4 Cryptographic support
      A.5 User data protection
      A.6 Identification and authentication
      A.7 Security management
      A.8 Privacy
      A.9 Protection of the TSF
      A.10 Resource utilization
      A.11 TOE Access
      A.12 Trusted path/channels
Annex B (normative): Protocol Implementation Conformance
        Statement (PICS)
Annex C (informative): Bibliography
History

Provides guidance to standards authors (rapporteurs and contributors) on the scope and application of the Common Criteria for Information Technology Security Evaluation and how ETSI standards may be developed to meet the goals and objectives of the Common Criteria.

Committee
TISPAN 07
DocumentType
Standard
Pages
60
PublisherName
European Telecommunications Standards Institute
Status
Current

TR 102 764 : 1.1.1 EHEALTH; ARCHITECTURE; ANALYSIS OF USER SERVICE MODELS, TECHNOLOGIES AND APPLICATIONS SUPPORTING EHEALTH
TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
EG 202 549 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES
TR 103 303 : 1.1.1 CYBER; PROTECTION MEASURES FOR ICT IN THE CONTEXT OF CRITICAL INFRASTRUCTURE
TR 102 420 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY
TR 187 020 : 1.1.1 RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436
GS NFV-SEC 006 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS
ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
TR 187 011 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
TR 187 002 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS
TS 187 016 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE)
ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
TS 102 556 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE

EG 201 383 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS) - USE OF SDL IN ETSI DELIVERABLES - GUIDELINES FOR FACILITATING VALIDATION AND THE DEVELOPMENT OF CONFORMANCE TESTS
TS 102 165-2 : 4.2.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES
TS 102 237-1 : 4.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; INTEROPERABILITY TEST METHODS AND APPROACHES; PART 1: GENERIC APPROACH TO INTEROPERABILITY TESTING
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
ETR 232 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY
ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
EG 201 015 : 2.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); STANDARDS ENGINEERING PROCESS; A HANDBOOK OF VALIDATION METHODS
ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
ETR 237 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
EG 202 107 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS) - PLANNING FOR VALIDATION AND TESTING IN THE STANDARDS-MAKING PROCESS
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
EG 202 106 : 2.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); GUIDELINES FOR THE USE OF FORMAL SDL AS A DESCRIPTIVE TOOL
ETR 184 : 20001 METHODS FOR TESTING AND SPECIFICATION (MTS); OVERVIEW OF VALIDATION TECHNIQUES FOR EUROPEAN TELECOMMUNICATION STANDARDS (ETSS) CONTAINING SDL
EG 201 058 : 1.2.4 METHODS FOR TESTING AND SPECIFICATION (MTS); IMPLEMENTATION CONFORMANCE STATEMENT (ICS) PROFORMA STYLE GUIDE
TR 101 052 : 1.1.1 SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD AUTHENTICATION AND KEY MANAGEMENT ALGORITHM SET TAA1
EG 201 872 : 1.2.1 METHODS FOR TESTING AND SPECIFICATIONS; METHODOLOGICAL APPROACH TO THE USE OF OBJECT-ORIENTATION DESIGN IN THE STANDARDS MAKING PROCESS
ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
EN 300 396-6 : 1.5.1 TERRESTRIAL TRUNKED RADIO (TETRA); DIRECT MODE OPERATION (DMO); PART 6: SECURITY
ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
SR 001 262 : 2.0.0 ETSI DRAFTING RULES
ETS 300 406 : 20001 METHODS FOR TESTING AND SPECIFICATION (MTS) - PROTOCOL AND PROFILE CONFORMANCE TESTING SPECIFICATIONS - STANDARDIZATION METHODOLOGY
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ETR 332 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
EN 300 392-7 : 3.3.1 TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

View more information
US$47.91
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.