{"id":1640,"date":"2025-07-22T20:27:34","date_gmt":"2025-07-22T16:27:34","guid":{"rendered":"https:\/\/cyberforensics.az\/?page_id=1640"},"modified":"2025-07-22T20:28:54","modified_gmt":"2025-07-22T16:28:54","slug":"iso-iec-15408-32022","status":"publish","type":"page","link":"https:\/\/cyberforensics.az\/ru\/iso-iec-15408-32022\/","title":{"rendered":"\u0418\u0421\u041e\/\u041c\u042d\u041a 15408-3:2022"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1640\" class=\"elementor elementor-1640\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12cecffb e-flex e-con-boxed e-con e-parent\" data-id=\"12cecffb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14e752e6 e-flex e-con-boxed e-con e-parent\" data-id=\"14e752e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c643637 elementor-widget elementor-widget-spacer\" data-id=\"5c643637\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4992d361 e-flex e-con-boxed e-con e-parent\" data-id=\"4992d361\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-76e64fff e-flex e-con-boxed e-con e-parent\" data-id=\"76e64fff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b556a2f elementor-widget elementor-widget-text-editor\" data-id=\"4b556a2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"stdTitle\"><span class=\"h4 fw-normal d-block mb-2\">\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438 \u0437\u0430\u0449\u0438\u0442\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u2014 \u041a\u0440\u0438\u0442\u0435\u0440\u0438\u0438 \u043e\u0446\u0435\u043d\u043a\u0438 \u0418\u0422-\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438<\/span><span class=\"h4 fw-semibold d-block\">\u0427\u0430\u0441\u0442\u044c 3: \u041a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438<\/span><\/p><div class=\"d-flex justify-content-between align-items-center\"><h2>Abstract<\/h2><\/div><div><p>\u00a0<\/p><p>This document defines the assurance requirements of the ISO\/IEC 15408 series. It includes the individual assurance components from which the evaluation assurance levels and other packages contained in ISO\/IEC 15408-5 are composed, and the criteria for evaluation of Protection Profiles (PPs), PP-Configurations, PP-Modules, and Security Targets (STs).<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c925e5b e-flex e-con-boxed e-con e-parent\" data-id=\"4c925e5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aff500 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"8aff500\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\r\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/ru\/iso-iec-50552021\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-left\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">\u041f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0439<\/span><span class=\"post-navigation__prev--title\">\u0418\u0421\u041e\/\u041c\u042d\u041a 5055:2021<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\r\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/ru\/iso-iec-ts-18013-72025\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">\u0421\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439<\/span><span class=\"post-navigation__next--title\">\u0418\u0421\u041e\/\u041c\u042d\u041a \u0422\u0421 18013-7:2025<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><span class=\"elementor-screen-only\">\u0421\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC 15408-3:2022 Information security, cybersecurity and privacy protection \u2014 Evaluation criteria for IT securityPart 3: Security assurance components Abstract \u00a0 This document defines the assurance requirements of the ISO\/IEC 15408 series. It includes the individual assurance components from which the evaluation assurance levels and other packages contained in ISO\/IEC 15408-5 are composed, and the criteria [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1640","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/1640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/comments?post=1640"}],"version-history":[{"count":0,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/1640\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/media?parent=1640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}