A relationship of configuration management requirements between KISEC and ISO/IEC 15408

被引:0
|
作者
Lee, HK
Shim, JS
Lee, S
Kim, JB
机构
[1] Daelim Coll, Anyang, South Korea
[2] Induk Univ, Seoul, South Korea
关键词
assurance requirement; configuration management; common criteria; KISEC;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are very many assurance methods and most of them are listed in the ISO/IEC 15443. The objective of ISO/IEC 15443 is to present a variety of assurance methods, and to guide the IT Security Professional in the selection of an appropriate assurance method (or combination of methods) to achieve confidence that a given IT security product, system, service, process or environmental factor satisfies its stated security assurance requirements. In the Part 2 of ISO/IEC 15443, many assurance methods and approaches proposed by various types of organizations are introduced, and in the Part 3 of ISO/IEC 15443, Analysis of Assurance Methods, various assurance methods are analyzed with respect to relationships and equivalency, effectiveness and required resources. This analysis may form the basis for determining assurance approaches and making trade-offs among the various factors for given security applications. The materials in Part 3 contain the mapping SSE-CMM (System Security Engineering Capability Maturity Model) to CC (Common Criteria), TCMM (Technical-CMM) to CC and so forth. SSE-CMM and T-CMM are listed in the Part 2, and the Part 3 selects the assurance method or approach in the Part 2 to verify the relationship of them by using the concepts based on the software engineering. An assurance method KISEC (Korea Information Security Evaluation Criteria) will be included in ISO/IEC 15443 Part 2, and the research about the relationship with respect to software engineering between KISEC and CC is needed. This paper is about the research for the relationship of assurance requirements for configuration management between KISEC and CC. This paper will help the development company of IT product and system to understand the evaluation criteria CC and prepare for an evaluation.
引用
收藏
页码:725 / 734
页数:10
相关论文
共 50 条
  • [1] A security requirement management database based on ISO/IEC 15408
    Morimoto, S
    Horie, D
    Cheng, JD
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 1 - 10
  • [2] Advanced Security Assurance Case Based on ISO/IEC 15408
    Potii, Oleksandr
    Illiashenko, Oleg
    Komin, Dmitry
    [J]. THEORY AND ENGINEERING OF COMPLEX SYSTEMS AND DEPENDABILITY, 2015, 365 : 391 - 401
  • [3] GEST: A Generator of ISO/IEC 15408 Security Target Templates
    Horie, Daisuke
    Yajima, Kenichi
    Azimah, Noor
    Goto, Yuichi
    Cheng, Jingde
    [J]. COMPUTER AND INFORMATION SCIENCE 2009, 2009, 208 : 149 - 158
  • [4] Development of Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045
    Bao, Da
    Sun, Wen
    Goto, Yuichi
    Cheng, Jingde
    [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 204 - 209
  • [5] A Supporting Tool for IT System Security Specification Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045
    Bao, Da
    Goto, Yuichi
    Cheng, Jingde
    [J]. TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING: PAKDD 2019 WORKSHOPS, 2019, 11607 : 3 - 14
  • [6] A web user interface of the security requirement management database based on ISO/IEC 15408
    Horie, Daisuke
    Morimoto, Shoichi
    Cheng, Jingde
    [J]. COMPUTATIONAL SCIENCE - ICCS 2006, PT 4, PROCEEDINGS, 2006, 3994 : 797 - 804
  • [7] Supporting Verification and Validation of Security Targets with ISO/IEC 15408
    Bao, Da
    Miura, Junichi
    Zhang, Ning
    Goto, Yuichi
    Cheng, Jingde
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2621 - 2628
  • [8] An Analysis of Software Supportable Tasks Related with ISO/IEC 15408
    Zhang, Ning
    Suhaimi, Ahmad Iqbal Hakim
    Goto, Yuichi
    Cheng, Jingde
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 601 - 606
  • [9] Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408
    Lee, Eun-Ser
    Kim, Haeng-Kon
    Hwang, Sun-Myoung
    [J]. SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 25 - +
  • [10] Supporting Tools for Software Supportable Tasks Related with ISO/IEC 15408
    Zhang, Ning
    Bao, Da
    Xu, Liqing
    Suhaimi, A. I. H.
    Miura, Junichi
    Goto, Yuichi
    Cheng, Jingde
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2002 - 2006