The security functional components defined in Part 2 of this standard group form the basis of the information technology (IT) security functional requirements for the target of evaluation (TOE) as described in the protection plan (PP) or security target (ST). . These requirements specify the desired security behavior expected of the TOE and are aimed at satisfying the security objectives stated in the PP or ST. These requirements are based on sensors that the user can detect from direct interaction with the TOE (i.e., input/output) or from the TOE's response to stimuli.
JIS X 5070-2:2000 history
2011JIS X 5070-1:2011 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general model
2000JIS X 5070-2:2000 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 2: Security functional requirements