A relationship of configuration management requirements between KISEC and ISO/IEC 15408

被引:0
|
作者
Lee, HK
Shim, JS
Lee, S
Kim, JB
机构
[1] Daelim Coll, Anyang, South Korea
[2] Induk Univ, Seoul, South Korea
关键词
assurance requirement; configuration management; common criteria; KISEC;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are very many assurance methods and most of them are listed in the ISO/IEC 15443. The objective of ISO/IEC 15443 is to present a variety of assurance methods, and to guide the IT Security Professional in the selection of an appropriate assurance method (or combination of methods) to achieve confidence that a given IT security product, system, service, process or environmental factor satisfies its stated security assurance requirements. In the Part 2 of ISO/IEC 15443, many assurance methods and approaches proposed by various types of organizations are introduced, and in the Part 3 of ISO/IEC 15443, Analysis of Assurance Methods, various assurance methods are analyzed with respect to relationships and equivalency, effectiveness and required resources. This analysis may form the basis for determining assurance approaches and making trade-offs among the various factors for given security applications. The materials in Part 3 contain the mapping SSE-CMM (System Security Engineering Capability Maturity Model) to CC (Common Criteria), TCMM (Technical-CMM) to CC and so forth. SSE-CMM and T-CMM are listed in the Part 2, and the Part 3 selects the assurance method or approach in the Part 2 to verify the relationship of them by using the concepts based on the software engineering. An assurance method KISEC (Korea Information Security Evaluation Criteria) will be included in ISO/IEC 15443 Part 2, and the research about the relationship with respect to software engineering between KISEC and CC is needed. This paper is about the research for the relationship of assurance requirements for configuration management between KISEC and CC. This paper will help the development company of IT product and system to understand the evaluation criteria CC and prepare for an evaluation.
引用
收藏
页码:725 / 734
页数:10
相关论文
共 50 条
  • [41] Validating the ISO/IEC 15504 measure of software requirements analysis process capability
    El Emam, K
    Birk, A
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (06) : 541 - 566
  • [42] An evaluation of the process capability implications of the requirements of ISO/IEC 20000-1
    Walker, Alastair
    Coletta, Antonio
    Sivaraman, Rama
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2014, 26 (12) : 1316 - 1326
  • [43] The challenges and benefits of implementing the requirements of ISO/IEC 17043 by PT/EQA providers
    Jane Gun-Munro
    [J]. Accreditation and Quality Assurance, 2012, 17 : 363 - 370
  • [44] Bridging the gap between user requirements and configuration requirements
    Colombo, Pietro
    Salehi, Pejman
    Khendek, Ferhat
    Toeroe, Maria
    [J]. 2012 17TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2012, : 13 - 22
  • [45] Management System According to ISO/IEC 17025: Method Validation
    Guirette-Barbosa, Omar-Alejandro
    Duran-Munoz, Hector-Antonio
    Cruz-Dominguez, Oscar
    Carrera-Escobedo, Jose-Luis
    Celaya-Padilla, Jose-Maria
    Castaneda-Burciaga, Selene
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (10):
  • [46] Improving the ISO/IEC 11770 Standard for Key Management Techniques
    Cremers, Cas
    Horvat, Marko
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2014, 2014, 8893 : 215 - 235
  • [47] Improving the ISO/IEC 11770 standard for key management techniques
    Cremers, Cas
    Horvat, Marko
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (06) : 659 - 673
  • [48] Information Security Risk Management: Handbook for ISO/IEC 27001
    Lomas, Elizabeth
    [J]. RECORDS MANAGEMENT JOURNAL, 2011, 21 (03) : 239 - +
  • [49] Senior management perspectives on ISO/IEC software engineering standards
    Weber, K
    Almeida, R
    [J]. FOURTH IEEE INTERNATIONAL SYMPOSIUM AND FORUM ON SOFTWARE ENGINEERING STANDARDS - PROCEEDINGS, 1999, : 244 - 244
  • [50] Improving the ISO/IEC 11770 standard for key management techniques
    Cas Cremers
    Marko Horvat
    [J]. International Journal of Information Security, 2016, 15 : 659 - 673