22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

54 Lotus Security Handbook<br />

10.Security Policy<br />

To provide management direction and support for information security<br />

Finally, with each section, there are detailed statements that comprise the<br />

standard.<br />

2.2.3 What ISO 17799 doesn’t contain<br />

ISO 17799 provides general guidance on the wide variety of topics listed above,<br />

but typically does not go into depth. It takes the “broad brush” approach.<br />

ISO 17799 thus does not provide definitive or specific material on any security<br />

topic, and it does not provide enough information to support an in-depth<br />

organizational information security review, or to support a certification program.<br />

However, ISO 17799 can be useful as a high-level overview of information<br />

security topics that can help senior management to understand the basic issues<br />

involved in each of the topic areas.<br />

2.3 Common Criteria (International Standard 15408)<br />

The Common Criteria for Information Technology Security Evaluation (CC)<br />

defines general concepts and principles of IT security evaluation and presents a<br />

general model of evaluation. It presents constructs for expressing IT security<br />

objectives, for selecting and defining IT security requirements, and for writing<br />

high-level specifications for products and systems.<br />

The CC represents the outcome of a series of efforts to develop criteria for<br />

evaluation of IT security that are broadly useful within the international<br />

community. In the early 1980s the Trusted Computer System Evaluation Criteria<br />

(TCSEC) was developed in the United States. In the early 1990s Europe<br />

developed the Information Technology Security Evaluation Criteria (ITSEC) built<br />

upon the concepts of the TCSEC. In 1990 the Organization for Standardization<br />

(ISO) sought to develop a set of international standard evaluation criteria for<br />

general use. The CC project was started in 1993 to bring all these (and other)<br />

efforts together into a single international standard for IT security evaluation. The<br />

new Criteria was to be responsive to the need for mutual recognition of<br />

standardized security evaluation results in a global IT market. Figure 2-3 shows<br />

the roadmap to the Common Criteria.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!