SANS 15446:2005
Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets

Standard No.
SANS 15446:2005
Release Date
2005
Published By
ZA-SANS
Status
 2009-12
Replace By
SANS 15446-2009
SANS 15446:2009
Latest
SANS 15446-2009
SANS 15446:2009
Scope
This document provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with ISO/IEC 15408 (the 'Common Criteria'). As such, the document is primarily aimed at those who are involved in the development of PPs and STs. However, it is also likely to be useful to evaluators of PPs and STs and to those who are responsible for monitoring PP and ST evaluation. It may also be of interest to consumers and users of PPs and STs who wish to understand what guidance the PP/ST author used, and which parts of the PP or ST are of principal interest. It is assumed that readers of this Technical Report are familiar with ISO/IEC 15408-1, and in particular Annexes B and C which describe PPs and STs. PP and ST authors will (of course) need to become familiar with the other parts of ISO/IEC 15408 as described in this Report, including introductory material such as the functional requirements paradigm described in ISO/IEC 15408-2, 1.3. This document is an informational ISO Technical Report intended for guidance only. It should not be cited as a Standard on the content or structure for the evaluation of PPs and STs. It is intended to be fully consistent with ISO/IEC 15408; however, in the event of any inconsistency between this Technical Report and ISO/IEC 15408, the latter as a normative Standard takes precedence. This Technical Report does not deal with issues such as PP registration and associated tasks such as the handling of protected intellectual property (e.g. patents) in a PP. For information on PP registration procedures, see [1].

SANS 15446:2005 history

  • 0000 SANS 15446-2009
  • 2005 SANS 15446:2005 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets



Copyright ©2024 All Rights Reserved