22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 2-3 Roadmap to the Common Criteria<br />

The benefits of the Common Criteria is that is provides a measure of confidence<br />

in the security of a product, system, or service. The Common Criteria can be<br />

used to build such confidence by providing a means to quantify or measure the<br />

extent to which security has been assessed in an internationally standard way.<br />

The use of the standard can assist an organization in understanding its IT<br />

security requirements and specifications.<br />

In terms of its contents, the Common Criteria is presented as a set of distinct but<br />

related parts, namely:<br />

► Part 1, Introduction and general model, is the introduction to the Common<br />

Criteria. It defines general concepts and principles of IT security evaluation<br />

and presents a general model of evaluation. Part 1 also presents constructs<br />

for expressing IT security objectives, for selecting and defining IT security<br />

requirements, and for writing high-level specifications for products and<br />

systems. In addition, the usefulness of each part of the CC is described in<br />

terms of each of the target audiences.<br />

► Part 2, Security functional requirements, establishes a set of security<br />

functional components as a standard way of expressing the security<br />

functional requirements for Targets of Evaluation (TOEs). Part 2 catalogues<br />

the set of functional components, families, and classes.<br />

Chapter 2. Security methodologies 55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!