PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.030 IT Security>PD ISO/IEC TR 20004:2015 Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
Sponsored link
immediate downloadReleased: 2016-01-31
PD ISO/IEC TR 20004:2015 Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045

PD ISO/IEC TR 20004:2015

Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045

Format
Availability
Price and currency
English Secure PDF
Immediate download
270.40 USD
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
27.04 USD
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
81.12 USD
English Hardcopy
In stock
270.40 USD
Standard number:PD ISO/IEC TR 20004:2015
Pages:26
Released:2016-01-31
ISBN:978 0 580 90586 5
Status:Standard
DESCRIPTION

PD ISO/IEC TR 20004:2015


This standard PD ISO/IEC TR 20004:2015 Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 is classified in these ICS categories:
  • 35.030 IT Security

This Technical Report refines the AVA_VAN assurance family activities defined in ISO/IEC 18045 and provides more specific guidance on the identification, selection and assessment of relevant potential vulnerabilities in order to conduct an ISO/IEC 15408 evaluation of a software target of evaluation. This Technical Report leverages publicly available information security resources to support the method of scoping and implementing ISO/IEC 18045 vulnerability analysis activities. The Technical Report currently uses the common weakness enumeration (CWE) and the common attack pattern enumeration and classification (CAPEC), but does not preclude the use of any other appropriate resources. Furthermore, this Technical Report is not meant to address all possible vulnerability analysis methods, including those that fall outside the scope of the activities outlined in ISO/IEC 18045 .

This Technical Report does not define evaluator actions for certain high assurance ISO/IEC 15408 components, where there is as yet no generally agreed guidance.