{"id":1503,"date":"2025-07-21T02:28:18","date_gmt":"2025-07-20T22:28:18","guid":{"rendered":"https:\/\/cyberforensics.az\/?page_id=1503"},"modified":"2025-07-21T02:28:58","modified_gmt":"2025-07-20T22:28:58","slug":"iso-iec-15408-12022","status":"publish","type":"page","link":"https:\/\/cyberforensics.az\/ru\/iso-iec-15408-12022\/","title":{"rendered":"ISO\/IEC 15408-1:2022"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1503\" class=\"elementor elementor-1503\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2251a5b4 e-flex e-con-boxed e-con e-parent\" data-id=\"2251a5b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7bd72721 e-flex e-con-boxed e-con e-parent\" data-id=\"7bd72721\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55be92cf elementor-widget elementor-widget-spacer\" data-id=\"55be92cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c7babeb e-flex e-con-boxed e-con e-parent\" data-id=\"4c7babeb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2291f186 e-flex e-con-boxed e-con e-parent\" data-id=\"2291f186\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f6c45d2 elementor-widget elementor-widget-text-editor\" data-id=\"2f6c45d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"stdTitle\"><span class=\"h4 fw-normal d-block mb-2\">\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438 \u0437\u0430\u0449\u0438\u0442\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u2014 \u041a\u0440\u0438\u0442\u0435\u0440\u0438\u0438 \u043e\u0446\u0435\u043d\u043a\u0438 \u0418\u0422-\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438<\/span><\/p><div class=\"d-flex justify-content-between align-items-center\"><h2>Abstract<\/h2><\/div><div><p>\u00a0<\/p><p>This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.<\/p><p>This document provides an overview of all parts of the ISO\/IEC 15408 series. It describes the various parts of the ISO\/IEC\u00a015408 series; defines the terms and abbreviations to be used in all parts of the standard; establishes the core concept of a Target of Evaluation (TOE); describes the evaluation context and describes the audience to which the evaluation criteria is addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given.<\/p><p>This document introduces:<\/p><p>\u2014\u00a0\u00a0\u00a0 the key concepts of Protection Profiles (PP), PP-Modules, PP-Configurations, packages, Security Targets (ST), and conformance types;<\/p><p>\u2014\u00a0\u00a0\u00a0 a description of the organization of security components throughout the model;<\/p><p>\u2014\u00a0\u00a0\u00a0 the various operations by which the functional and assurance components given in ISO\/IEC\u00a015408\u20112 and ISO\/IEC\u00a015408\u20113 can be tailored through the use of permitted operations;<\/p><p>\u2014\u00a0\u00a0\u00a0 general information about the evaluation methods given in ISO\/IEC\u00a018045;<\/p><p>\u2014\u00a0\u00a0\u00a0 guidance for the application of ISO\/IEC\u00a015408\u20114 in order to develop evaluation methods (EM) and evaluation activities (EA) derived from ISO\/IEC\u00a018045;<\/p><p>\u2014\u00a0\u00a0\u00a0 general information about the pre-defined Evaluation Assurance Levels (EALs) defined in ISO\/IEC\u00a015408\u20115;<\/p><p>\u2014\u00a0\u00a0\u00a0 information in regard to the scope of evaluation schemes.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-55fe7f5 e-flex e-con-boxed e-con e-parent\" data-id=\"55fe7f5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16d3aa12 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"16d3aa12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\r\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/ru\/iso-15223-12021\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-left\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">\u041f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0439<\/span><span class=\"post-navigation__prev--title\">\u0418\u0421\u041e 15223-1:2021<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\r\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/ru\/iso-iec-22123-12023\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">\u0421\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439<\/span><span class=\"post-navigation__next--title\">\u0418\u0421\u041e\/\u041c\u042d\u041a 22123-1:2023<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><span class=\"elementor-screen-only\">\u0421\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>ISO 21001:2025 Information security, cybersecurity and privacy protection \u2014 Evaluation criteria for IT security Abstract \u00a0 This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1503","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/1503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/comments?post=1503"}],"version-history":[{"count":0,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/1503\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/media?parent=1503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}