A relationship of configuration management requirements between KISEC and ISO/IEC 15408

被引:0
|
作者
Lee, HK
Shim, JS
Lee, S
Kim, JB
机构
[1] Daelim Coll, Anyang, South Korea
[2] Induk Univ, Seoul, South Korea
关键词
assurance requirement; configuration management; common criteria; KISEC;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are very many assurance methods and most of them are listed in the ISO/IEC 15443. The objective of ISO/IEC 15443 is to present a variety of assurance methods, and to guide the IT Security Professional in the selection of an appropriate assurance method (or combination of methods) to achieve confidence that a given IT security product, system, service, process or environmental factor satisfies its stated security assurance requirements. In the Part 2 of ISO/IEC 15443, many assurance methods and approaches proposed by various types of organizations are introduced, and in the Part 3 of ISO/IEC 15443, Analysis of Assurance Methods, various assurance methods are analyzed with respect to relationships and equivalency, effectiveness and required resources. This analysis may form the basis for determining assurance approaches and making trade-offs among the various factors for given security applications. The materials in Part 3 contain the mapping SSE-CMM (System Security Engineering Capability Maturity Model) to CC (Common Criteria), TCMM (Technical-CMM) to CC and so forth. SSE-CMM and T-CMM are listed in the Part 2, and the Part 3 selects the assurance method or approach in the Part 2 to verify the relationship of them by using the concepts based on the software engineering. An assurance method KISEC (Korea Information Security Evaluation Criteria) will be included in ISO/IEC 15443 Part 2, and the research about the relationship with respect to software engineering between KISEC and CC is needed. This paper is about the research for the relationship of assurance requirements for configuration management between KISEC and CC. This paper will help the development company of IT product and system to understand the evaluation criteria CC and prepare for an evaluation.
引用
收藏
页码:725 / 734
页数:10
相关论文
共 50 条
  • [21] ISO/IEC Competence Requirements for Information Security Professionals
    Miloslayskaya, Natalia
    Tolstoy, Alexander
    [J]. INFORMATION SECURITY EDUCATION FOR A GLOBAL DIGITAL SOCIETY, WISE 10, 2017, 503 : 135 - 146
  • [22] Improvement proposals for requirements compliance in the ISO/IEC 29110 standard
    Mejia, Jezreel
    Orozco-Jimenez, Ernesto
    Terron-Macias, Victor
    Acevedo, Daniela
    [J]. 2023 MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, ENC, 2024,
  • [23] Relationship between CMMI maturity levels and ISO/IEC 15504 processes capability profiles
    Mitasiunas, Antanas
    Ragaisis, Saulius
    [J]. DATABASES AND INFORMATION SYSTEMS: COMMUNICATIONS, MATERIALS OF DOCTORAL CONSORTIUM, 2006, : 119 - 129
  • [24] The relationship between ISO/IEC 15504 process capability levels, ISO 9001 certification and organization size: An empirical study
    Jung, HW
    Hunter, R
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 59 (01) : 43 - 55
  • [25] GENERAL REQUIREMENTS ACCORDING TO JUS ISO IEC GUIDELINES FOR LABORATORY ACCREDITATION
    MILICEVIC, P
    ACIMOVIC, N
    [J]. JUGOSLOVENSKA MEDICINSKA BIOHEMIJA-YUGOSLAV MEDICAL BIOCHEMISTRY, 1995, 14 (1-2): : 47 - 49
  • [26] Towards a taxonomy of privacy requirements based on the LGPD and ISO/IEC 29100
    Ferrao, Sammara Ellen Renner
    Silva, Geovana Ramos Sousa
    Canedo, Edna Dias
    Mendes, Fabiana Freitas
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2024, 168
  • [27] Management review checklist for ISO/IEC 17025 and ISO 15189 quality-management systems
    Dimitris G. Theodorou
    Panagiotis C. Anastasakis
    [J]. Accreditation and Quality Assurance, 2009, 14 : 107 - 110
  • [28] Management review checklist for ISO/IEC 17025 and ISO 15189 quality-management systems
    Theodorou, Dimitris G.
    Anastasakis, Panagiotis C.
    [J]. ACCREDITATION AND QUALITY ASSURANCE, 2009, 14 (02) : 107 - 110
  • [29] Practical design recovery techniques for embedded operating system on complying with RTCA/DO-178B and ISO/IEC15408
    Kim, M
    Kim, S
    Choi, M
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 621 - 627
  • [30] Green IT Governance and Management based on ISO/IEC 15504
    David Paton-Romero, J.
    Baldassarre, Maria Teresa
    Rodriguez, Moises
    Piattini, Mario
    [J]. COMPUTER STANDARDS & INTERFACES, 2018, 60 : 26 - 36