Methodology for IT security evaluation

  • Home
  • Methodology for IT security evaluation

Error message

User warning: The following module is missing from the file system: cascading_grants_services. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1184 of /var/www/html/web/includes/bootstrap.inc).

ISO/IEC 18045:2008

Methodology for IT security evaluation

SCOPE

This International Standard is a companion document to the evaluation criteria for IT security defined in ISO/IEC 15408. It defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 evaluation, using the criteria and evaluation evidence defined in ISO/IEC 15408.

LATEST PUBLICATION DATE
August 2008
COMMITTEE / WG
WIKI WATCH

Insert here: activities, gaps, opportunities, and other user driven comments

  • jbringer's picture

    Submitted by jbringer on Fri, 09/27/2019 - 09:19

    The MAJOR standard related to security evaluation (also known as CEM - Common Methodology for Information Technology Security Evaluation -- with Common Criteria community). Currently under revision in parallel of the revision of 15408 to reflect the recent practices in security evaluation.


    Like:
    +1
    0
    -1

submit a comment

Back to the search results