ISO/IEC TR 15443-2:2012

Information technology — Security techniques — Security assurance framework — Part 2: Analysis ISO/IEC TR 15443-2:2012

Publication date:   Nov 16, 2012

General information

90.93 Standard confirmed   Jul 9, 2018

ISO/IEC

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection

Technical Report

35.030   IT Security

Buying

Published

Language in which you want to receive the document.

Scope

ISO/IEC TR 15443-2:2012 builds on the concepts presented in ISO/IEC TR 15443-1. It provides a discussion of the attributes of security assurance conformity assessment methods that contribute towards making assurance claims and providing assurance evidence to fulfil meeting the assurance requirements for a deliverable.
ISO/IEC TR 15443-2:2012 proposes criteria for comparing and analysing different SACA methods. The reader is cautioned that the methods used as examples in ISO/IEC TR 15443-2:2012 are considered to represent popularly used methods at the time of its writing. New methods may appear, and modification or withdrawal of the methods cited may occur. It is intended that the criteria can be used to describe and compare any SACA method whatever its provenance.

Life cycle

PREVIOUSLY

WITHDRAWN
ISO/IEC TR 15443-2:2005

WITHDRAWN
ISO/IEC TR 15443-3:2007

NOW

PUBLISHED
ISO/IEC TR 15443-2:2012
90.93 Standard confirmed
Jul 9, 2018