Объединенная экспертная группа по инициативе преобразования



страница44/48
Дата09.05.2018
Размер6.15 Mb.
1   ...   40   41   42   43   44   45   46   47   48
AcquisitionProcess

Design / Implementation Information For Security Controls



SA-17

Developer Security Architecture and Design

ADV_ARC.1

EAL2
EAL3


EAL4
EAL5
EAL6
EAL7

Security Architecture

Security Architecture Description



AC-25

Reference Monitor

SA-17

Developer Security Architecture and Design

SA-18

Tamper Resistance and Detection

SC-3

Security Function Isolation

SC-3(1)

Security Function Isolation

Hardware Separation



SC-3(2)

Security Function Isolation

Minimize Nonsecurity Functionality



SC-41

Process Isolation

ADV_FSP.1

EAL1


Functional Specification

Basic Functional Specification



SA-4(1)

Acquisition Process

Functional Properties of Security Controls



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



ADV_FSP.2

EAL2


Functional Specification

Security-Enforcing Functional Specification



SA-4(1)

Acquisition Process

Functional Properties of Security Controls



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17(4)

Developer Security Architecture and Design

Informal Correspondence



ADV_FSP.3

EAL3


Functional Specification

Functional Specification With Complete Summary



SA-4(1)

Acquisition Process

Functional Properties of Security Controls



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17(4)

Developer Security Architecture and Design

Informal Correspondence



ADV_FSP.4

EAL4


Functional Specification

Complete Functional Specification



SA-4(1)

Acquisition Process

Functional Properties of Security Controls



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17(4)

Developer Security Architecture and Design

Informal Correspondence



ADV_FSP.5

EAL5
EAL6



Functional Specification

Complete Semi-Formal Functional Specification with Additional Error Information



SA-4(1)

Acquisition Process

Functional Properties of Security Controls



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17(4)

Developer Security Architecture and Design

Informal Correspondence



ADV_FSP.6

EAL7


Functional Specification

Complete Semi-Formal Functional Specification with Additional Formal Specification



SA-4(1)

Acquisition Process

Functional Properties of Security Controls



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17(3)

Developer Security Architecture and Design

Formal Correspondence



SA-17(4)

Developer Security Architecture and Design

Informal Correspondence



ADV_IMP.1

EAL4
EAL5



Implementation Representation

Implementation Representation of the TSF



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



ADV_IMP.2

EAL6
EAL7



Implementation Representation

Complete Mapping of the Implementation Representation of the TSF



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17(3)

Developer Security Architecture and Design

Formal Correspondence



ADV_INT.1

TSF Internals

Well-Structured Subset of TSF Internals



SA-8

Security Engineering Principles

SC-3(3)

Security Function Isolation

Minimize Nonsecurity Functionality



SC-3(4)

Security Function Isolation

Module Coupling and Cohesiveness



SC-3(5)

Security Function Isolation

Layered Structures




ADV_INT.2

EAL5


TSF Internals

Well-Structured Internals



SA-8

Security Engineering Principles

SC-3(3)

Security Function Isolation

Minimize Nonsecurity Functionality



SC-3(4)

Security Function Isolation

Module Coupling and Cohesiveness



SC-3(5)

Security Function Isolation

Layered Structures




ADV_INT.3

EAL6
EAL7



TSF Internals

Minimally Complex Internals



SA-8

Security Engineering Principles

SA-17(5)

Developer Security Architecture and Design

Conceptually Simple Design



SC-3(3)

Security Function Isolation

Minimize Nonsecurity

Functionality


SC-3(4)

Security Function Isolation

Module Coupling and Cohesiveness



SC-3(5)

Security Function Isolation

Layered Structures



AC-25

Reference Monitor


ADV_SPM.1

EAL6
EAL7



Security Policy Modeling

Formal TOE Security Policy Model



SA-17(1)

Developer Security Architecture and Design

Formal Policy Model



SA-17(3)

Developer Security Architecture and Design

Formal Correspondence




ADV_TDS.1

EAL2


TOE Design

Basic Design



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17

Developer Security Architecture and Design


ADV_TDS.2

EAL3


TOE Design

Architectural Design



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17

Developer Security Architecture and Design

ADV_TDS.3

EAL4


TOE Design

Basic Modular Design



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17

Developer Security Architecture and Design

ADV_TDS.4

EAL5


TOE Design

Semiformal Modular Design



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17

Developer Security Architecture and Design

SA-17(2)

Developer Security Architecture and Design

Security Relevant Components



SA-17(4)

Developer Security Architecture and Design

Informal Correspondence



ADV_TDS.5

EAL6


TOE Design

Complete Semiformal Modular Design



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17

Developer Security Architecture and Design

SA-17(2)

Developer Security Architecture and Design

Security Relevant Components



SA-17(4)

Developer Security Architecture and Design

Informal Correspondence




ADV_TDS.6

EAL7


TOE Design

Complete Semiformal Modular Design with Formal High-Level Design Presentation



SA-4(2)

Acquisition Process

Design / Implementation Information for Security Controls



SA-17

Developer Security Architecture and Design

SA-17(2)

Developer Security Architecture and Design

Security Relevant Components



SA-17(3)

Developer Security Architecture and Design

Formal Correspondence



SA-17(4)

Developer Security Architecture and Design

Informal Correspondence



AGD_OPE.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

Operational User Guidance

Operational User Guidance



SA-5

Information System Documentation

AGD_PRE.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

Preparative Procedures

Preparative Procedures



SA-5

Information System Documentation

ALC_CMC.1

EAL1


CM Capabilities

Labeling of the TOE



CM-9

Configuration Management Plan

SA-10

Developer Configuration Management

ALC_CMC.2

EAL2


CM Capabilities

Use of a CM System



CM-9

Configuration Management Plan

SA-10

Developer Configuration Management

ALC_CMC.3

EAL3


CM Capabilities

Authorization Controls



CM-3

Configuration Change Control

CM-9

Configuration Management Plan

SA-10

Developer Configuration Management

ALC_CMC.4

EAL4
EAL5



CM Capabilities

Production Support, Acceptance Procedures, and Automation



CM-3

Configuration Change Control

CM-3(1)

Configuration Change Control

Automated Document / Notification / Prohibition of Changes



CM-3(3)

Configuration Change Control

Automated Change Implementation



CM-9

Configuration Management Plan

SA-10

Developer Configuration Management

ALC_CMC.5

EAL6
EAL7



CM Capabilities

Advanced Support



CM-3

Configuration Change Control

CM-3(1)

Configuration Change Control

Automated Document / Notification / Prohibition of Changes



CM-3(2)

Configuration Change Control

Test / Validate / Document Changes



CM-3(3)

Configuration Change Control

Automated mechanisms to field and deploy



CM-9

Configuration Management Plan

SA-10

Developer Configuration Management


ALC_CMS.1

EAL1


CM Scope

TOE CM Coverage



CM-9

Configuration Management Plan

SA-10

Developer Configuration Management

ALC_CMS.2

EAL2


CM Scope

Parts of the TOE CM Coverage



CM-9

Configuration Management Plan

SA-10

Developer Configuration Management

ALC_CMS.3

EAL3


CM Scope

Implementation Representation CM Coverage



CM-9



Поделитесь с Вашими друзьями:
1   ...   40   41   42   43   44   45   46   47   48


База данных защищена авторским правом ©vossta.ru 2019
обратиться к администрации

    Главная страница