Korea IT Security Evaluation and Certification Scheme
|
|
|
- Gary Pearson
- 10 years ago
- Views:
Transcription
1 Korea IT Security Evaluation and Certification Scheme Korea Certification Body Dae Ho, Lee
2 Agenda I KECS Introduction II Role and Responsibility of CB III Evaluation and Certification Procedure IV Product and Protection Profile 2
3 Korea IT Security Evaluation and Certification Scheme (KECS) Overview History Organization Publication Quality System Approval policy of EF 3
4 KECS Overview Objective Gain global trust and reliability of IT security system Improve international competitiveness of IT product Improve IT security level of national communication Network Contribute to the realization of a sound information society Legal Status Article 15 of the Framework Act on Information Promotion Article 16 of the Enforcement Decree of the Framework Act on Information Promotion 4
5 KECS History 1995 Aug : Framework Act on IP and its Enforcement Decree 1998 Feb : Firewall Evaluation 2000 Jul : IDS evaluation Aug : Established Evaluation Certification Scheme Aug : Adopted CC, ISO/IEC as IT security evaluation criteria VPN evaluation Nov : Access Control System, Fingerprint Recognition System, Smartcard evaluation 2004 Sep : Submitted Application to join CCRA 2005 Jan : CC became the only evaluation criteria 5
6 KECS Organization Certification Body (National Intelligence Service) EWP Work Package Observation Report Evaluation Report Certificate Certification Report Certified Products List Publish Certification Report Evaluation and Certification Scheme Evaluation Methodology Evaluation Management and Oversight Evaluation Facility (Korea Info. Security Agency) User Application for evaluation Consultation on evaluation Sponsor IT Product Protection Profile Deliverables Developer 6
7 KECS Organization CB(1/2) Senior Executive Certification committee ITSCC Director, ITSCC (Certification manager) Certification Mgmt Team (Quality manager) Oversee evaluation Site visit Operate Certification Committee Issue certificates Maintenance of Assurance Support Mgmt Team Prepare to Join CCRA Operate scheme Develop Roadmap for PP development Publish CPL Audit Provide training course ITSCC : IT Security Certification Center 7
8 KECS Organizations CB(2/2) Senior Executive /Certification/Quality Manager Senior Executive Approves scheme Approves quality manual Approves issuance of certificate Certification Manager Supervises operation of certification body Approves internal audit Operates Certification Committee Quality Manager Operates and Maintains the quality system Develops plan and executes internal audit Operates education and training course 8
9 KECS Organizations - EF President IT Security Evaluation Center Vice president (Quality manager) Evaluation Planning Team (Quality assistant manager) Evaluation Team 1 (Technical manager) Evaluation Team 2 (Technical manager) Operate EF quality system Develop PP Research & support related to evaluation service Firewall Fingerprint Smartcard Etc IDS VPN Access control Etc. 9
10 KECS Publications KECS Overview of scheme : Principle of evaluation, Scope, Organizational structure, Legal status, Operating resource, Etc. Role and Responsibility of the Sponsor/EF/CB Evaluation and Certification procedure Maintenance of certified products Quality Manual ISO/IEC Guide 65 Quality system management Qualification of personnel, Training & education Data/Record management, Protecting and sharing of information Oversee Evaluation, Management of evaluation lab/equipment Appeal or Conciliation, Internal audits, Etc. 10
11 Quality Manual Sampling Management of Deliverables Protection of Confidential Information Corrective and Preventive Measure Handling of Dispute Training And Education Certification Reparation Operation of Certification lab Certification Committee Written Pledge Management Review Management of Certification Regulation Document Management Management of Assurance Certification Management Record Management Internal Audit Written Pledge Guaranteeing of Independence 11
12 Approval policy of EF KECS CCRA B.3 Framework Act on Information Promotion Evaluation Facility accredited approved AB CB established or KISA (EF) Evaluation Facility established Law/ statutory instrument 12
13 Role and Responsibility of Certification Body Qualification Assignment Basic/Advanced Training Certification Activity Certification Committee Certification Report and Certificate
14 Role and Responsibility of CB Written Pledge Qualification of Evaluator and Certifier Trainee Certifier (evaluator) Basic/Advanced Training Certifier (evaluator) Experience of of C/E C/E (more (more than than 2 product) Capability of of EAL3 EAL3 C/E C/E Senior Certifier (evaluator) Experience of of C/E C/E (more (more than than 3 years) Capability of of EAL4 EAL4 C/E C/E * C/E : Certification and Evaluation 14
15 Role and Responsibility of CB Basic/Advanced Training Basic (5days) ISO/IEC Guide 65 ISO/IEC CC/CEM KECS CCRA Requirements Advanced (10days) How to write and evaluate PP, ST and deliverables EWP Evaluate deliverables write Evaluation Technical Report Site visit 15
16 Role and Responsibility of CB Certification Activity Review and Record Review the following document and record result of certification in the CB Review Comment EWP, ST, WP, OR, ETR(PP, TOE) The review meeting of EWP and OR Evaluation of Testing and Vulnerability Attend Review the plan for testing of EF Independent evaluator testing and vulnerability testing Evaluation of the on site security environment Review the plan for on site evaluation 16
17 Role and Responsibility of CB Certification Committee Composed of 12 professionals from industry, academia, research institutes and the government Check for validity and impartiality of the evaluation results Review any major changes made to scheme Mediate dispute between sponsor, EF and CB 17
18 Evaluation Certification Procedure Preparation Phase Evaluation Phase Certification Phase 18
19 Sponsor EF Pre CB Inquiry about Evaluation Preparation of Deliverables Consultation of Evaluation Preparation Phase Apply for evaluation(deliverables) Sign Contract Accept deliverables Kick off Meeting with EF and CB Develop EWP Evaluation Phase Evaluate TOE Approve EWP Monitor Evaluation Develop ETR Review ETR Certification Phase Publish the certification report on the website Register the certificate to the CPL Receive the certificate Certification Committee Produce the Certification Report Issue the certificate 19
20 Evaluation Certification Procedure Preparation Phase Sponsor EF CB Inquiry about Evaluation Consultation of Evaluation Separate evaluator with consultant for impartiality and independency of evaluation Preparation of Deliverables Apply for evaluation With deliverables Sign Contract Accept deliverables - Review deliverables for completeness - Review Contract - Assign a certifier - Review deliverables 20
21 Evaluation Certification Procedure Evaluation Phase(1/2) Sponsor EF CB Develop EWP Approve EWP Consider complexity of security functions, scope of evaluation Review the EWP - Appropriateness of the formation of the evaluation team - Appropriateness of the method of calculating the duration of the evaluation - Appropriateness of the claimed PP and TOE scope Kick off Meeting With Sponsor and CB 21
22 Evaluation Certification Procedure Evaluation Phase(2/2) Sponsor EF CB Evaluation TOE Monitor Evaluation - Compliance with CC,CEM - Produce OR, WP for each work unit - Site visit - Review OR, WP - Testing and vulnerability - Site visit - Compliance with scheme Develop ETR Review ETR - Review ETR impartiality of evaluation conformance of CC/CEM - Compliance with scheme22
23 Evaluation Certification Procedure` Certification Phase Sponsor EF CB Certification Committee - Review the all documents of evaluation and certification (EWP, OR, WP, ETR, etc) Publish the Certification Report on the website Register the certificate to the CPL Produce the Certification Report Issue the certificate Receive the certificate 23
24 Certification Maintenance Sponsor CB Re-evaluation Approve Change? Yes Sponsor No Sponsor EF EF deliverables Test and analysis result CB Application for change approval (deliverables) Consult Contract Evaluation Approve Change? No Notify result Yes Sponsor 24
25 Product and Protection Profile Certified product Protection Profile 25
26 Product and Protection Profile Certified Product <As of July 18, 2005> Category sum Domestic Criteria FW IDS FW 2 2 Common Criteria FW, VPN IDS Access Control System Total Firewall IDS VPN Biometric Access Control Smart Card IPS 26
27 Product and Protection Profile Protection Profile Publication Title EAL Firewall protection profile V1.1 EAL VPN protection profile V1.1 EAL Intrusion detection system protection profile V1.1 EAL VPN gateway protection profile V1.1 EAL Firewall-VPN composite protection profile V1.0 EAL Label-based based access control system protection profile V1.0 EAL Fingerprint recognition system protection profile V1.0 EAL Smartcard open platform protection profile V1.0 EAL Network Intrusion Prevention System Protection Profile V1.0 EAL4 27
28 Q & A ITSCC of NIS (Certification Body) - Homepage : [email protected] KISA (Evaluation Body) - Homepage : [email protected] 28
MyCC Scheme Overview SECURITY ASSURANCE. Creating Trust & Confidence. Norhazimah Abdul Malek MyCC Scheme Manager zie@cybersecurity.
An Agency Under MOSTI MyCC Scheme Overview SECURITY ASSURANCE Creating Trust & Confidence Norhazimah Abdul Malek MyCC Scheme Manager [email protected] Copyright 2007 CyberSecurity Malaysia Slide no:
Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report
KECS-CR-16-36 Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report Certification No.: KECS-PP-0717-2016 2016. 6. 10 IT Security Certification Center History of Creation
Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates. Copyright 2010 CyberSecurity Malaysia
Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates Copyright 2010 CyberSecurity Malaysia Agenda 1. Understand Why we need product evaluation and certification ICT
Document ID: JIL-Security-Event-Management-Processs-V1-0 Subject: Security Event Management Process. Introduction
SOG-IS Recognition Agreement Joint Interpretation Library Working Group Policies and Procedures Document ID: JIL-Security-Event-Management-Processs-V1-0 Subject: Security Event Management Process Introduction
Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT
Template: CSEC_mall_doc.dot, 7.0 Ärendetyp: 6 Diarienummer: 14FMV10188-21:1 Dokument ID CB-015 HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2015-06-12 Country of origin: Sweden Försvarets
Guidelines for the Accreditation of Information Technology Security Evaluation and Testing Facilities
Guidelines for the Accreditation of Information Technology Security Evaluation and Testing Facilities (ITSET) GUIDELINES FOR THE ACCREDITATION OF INFORMATION TECHNOLOGY SECURITY EVALUATION AND TESTING
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
National Information Assurance Partnership /Common Criteria Evaluation and Validation Scheme. Publication #2
National Information Assurance Partnership /Common Criteria Evaluation and Validation Scheme Publication #2 Quality Manual and Standard Operating Procedures May 2014 Version 3.0 All correspondence in connection
Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276
Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276 702500 [email protected] Agenda Background and
CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems
Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances
122 CERTIFICATION REPORT No. CRP294 Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances Issue 1.0 November 2015
C033 Certification Report
C033 Certification Report Mobile Billing System File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please email: [email protected]
FIA Protection Against Mileage Fraud by Common Criteria
Informal document GRSG-108-37 (108th GRSG, 4-8 May 2015, agenda item 3) FIA Protection Against Mileage Fraud by Common Criteria UNECE 2015 05 05 FIA Protection against Mileage Fraud by Common Criteria
General Requirements for Accreditation of ASNITE. Testing Laboratories of Information Technology. (The 12th Edition) November 1, 2014
TIRP21 General Requirements for Accreditation of ASNITE Testing Laboratories of Information Technology 1/43 (Tentative Translation) Accreditation - Department - TIRP21 ASNITE Test IT Publication Document
Information Security Management Systems
Information Security Management Systems Information Security Management Systems Conformity Assessment Scheme ISO/IEC 27001:2005 (JIS Q 27001:2006) ITMangement Center Japan Information Processing Development
C015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
Certification Report
Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Certification as a model of recognising and improving personnel s competences in OSH
Certification as a model of recognising and improving personnel s competences in OSH Strengthening OSH knowledge and innovation as driver of EU smart growth 7 November 2011, Warsaw, Poland Witold Gacek,
Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin
Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden [email protected] www.combitech.se
22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1
22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1 Introduction of IPA Copyright 2010 Information-Technology
FSSC 22000-Q. Certification module for food quality in compliance with ISO 9001:2008. Quality module REQUIREMENTS
FSSC 22000-Q Certification module for food quality in compliance with ISO 9001:2008 Quality module REQUIREMENTS Foundation for Food Safety Certification Gorinchem, The Netherlands: 2015 Version Control
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Certification Report
Certification Report McAfee Network Security Platform M-Series and NS- Series Sensors Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
Certification Report
Certification Report EAL 3+ Evaluation of Extreme Networks ExtremeXOS Network Operating System v12.3.6.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Certification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
National Information Assurance Program (NIAP) Evolution
National Information Assurance Program (NIAP) Evolution 28 September 2010 Brian Henderson NSA Commercial Solutions Center A Historical Perspective 1983-1997 NSA s National Computer Security Center (NCSC)
Certification Report
Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Consumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
C038 Certification Report
C038 Certification Report TAXSAYA Online File name: Version: v1a Date of document: 15 August 2013 Document classification: For general inquiry about us or our services, please email: [email protected]
Ashley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
TERMS OF REFERENCE FOR THE HUMAN RESOURCES AND COMPENSATION COMMITTEE
I. PURPOSE The purpose of the Human Resources and Compensation Committee (the Committee ) is to assist the Board in fulfilling its obligations relating to human resource and compensation policy and related
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications
IT Security Evaluation in China
IT Security Evaluation in China Yi Mao, Ph.D., CISSP atsec information security cooperation Austin, TX USA www.atsec.com [email protected] ICCC 2012 September 18-20, Paris, France atsec information security,
TG 47-01. TRANSITIONAL GUIDELINES FOR ISO/IEC 17021-1:2015, ISO 9001:2015 and ISO 14001:2015 CERTIFICATION BODIES
TRANSITIONAL GUIDELINES FOR ISO/IEC 17021-1:2015, ISO 9001:2015 and ISO 14001:2015 CERTIFICATION BODIES Approved By: Senior Manager: Mpho Phaloane Created By: Field Manager: John Ndalamo Date of Approval:
Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD
TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification
Managing Projects with Practical Software & Systems Measurement PSM
Managing Projects with Practical Software & Systems Measurement PSM Mauricio Aguiar PSM Qualified Instructor TI Métricas Ltda. Av. Rio Branco 181/1910 Rio de Janeiro, RJ Brazil 20040-007 www.metricas.com.br
TURKISH COMMON CRITERIA CERTIFICATION SCHEME TSE-CCCS TURKISH NATIONAL UPDATE, 2013
TURKISH COMMON CRITERIA CERTIFICATION SCHEME TSE-CCCS TURKISH NATIONAL UPDATE, 2013 Mariye Umay Akkaya Director of TK`s CB 14 th ICCC,10.09.2013,Orlando TURKISH COMMON CRITERIA CERTIFICATION SCHEME-2013
AgriLife Information Technology IT General Session January 2010
AgriLife Information Technology IT General Session January 2010 Agenda Topics Year in Review Enterprise IT Services Update FirstCall Overview and Next Steps Sophos Antivirus Initiative Update Information/
Certification Report
Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
IAS ACCREDITED INSPECTION AGENCIES: GUIDELINES FOR CONDUCTING INTERNAL AUDITS AND MANAGEMENT REVIEWS. Revised January, 2016
IAS ACCREDITED INSPECTION AGENCIES: GUIDELINES FOR CONDUCTING INTERNAL AUDITS AND MANAGEMENT REVIEWS Revised January, 2016 IAS has found that inspection agency personnel are often confused by the requirements
Process Validation Workshops. Overview Session
Process Validation Workshops Overview Session 2 Session Objectives: Prepare staff for participating in a Process Validation Workshop Clarify the Purpose of Process Validation Workshops Clarify Expected
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
C013 Certification Report
C013 Certification Report VirtualEye v5.0 File name: Version: v1a Date of document: 8 March 2011 Document classification: For general inquiry about us or our services, please email: [email protected]
Certification Report
Certification Report HP Universal CMDB and Universal Discovery v10.21 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
COURTESY TRANSLATION
PREMIER MINISTRE Secrétariat général de la défense nationale Paris, 7 April 2003 872 /SGDN/DCSSI/SDR Reference : SIG/P/01.1 Direction centrale de la sécurité des systèmes d information PROCEDURE CERTIFICATION
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
Build a CC assurance package dedicated to your risk assessment. Francois GUERIN Security Program Manager francois.guerin@gemalto.
Build a CC assurance package dedicated to your risk assessment Francois GUERIN Security Program Manager [email protected] Gemplus & Axalto merge into Gemalto 1.7 billion in combined pro-forma
Certification Process Requirements
SAAS Certification Process Requirements SAAS Procedure 200 and ISO/IEC 17021 Social Accountability Accreditation Services, June 2010 Accreditation Process and Policies SAAS Normative Requirements SAAS
JWES Activities of Education and Certification System for Welding Engineers in Asian Countries
JWES Activities of Education and Certification System for Welding Engineers in Asian Countries H. Harasawa 1) & T. Ohji 2) 1) Technical advisor, The Japan Welding Engineering Society 2) Professor Emeritus
Validation Audit Process Definition and Criteria
See Revision History at end of document Rev 1 January 14, 2010 Rev 2 October 26, 2010 Rev 3 May 26, 2011 Rev 4 January 12, 2012 Project Purpose: Twenty-threeTwelve one-day audits, each conducted by two
Certification Report
Certification Report EAL 4+ Evaluation of Solaris 10 Release 11/06 Trusted Extensions Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Certification Report
Certification Report EAL 4 Evaluation of Desktop: Enterprise Whole Disk Encryption Only Edition, Version 9.10.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Joint Interpretation Library. Guidance for smartcard evaluation
Joint Interpretation Library Guidance for smartcard evaluation Version 2.0 February 2010 Table of content 1. REFERENCES 5 2. OBJECTIVE 6 3. SMARTCARD PRODUCT PRESENTATION AND DEFINITIONS 7 3.1. Glossary
Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64
122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction
Secure software development in the Russian IT Security Certification Scheme. Alexander Barabanov, Alexey Markov, Valentin Tsirlov
Secure software development in the Russian IT Security Certification Scheme Alexander Barabanov, Alexey Markov, Valentin Tsirlov Agenda Brief overview Current status of the Russian IT Security Certification
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA Dr. Stephan Beirer [email protected] Sichere ebusiness
Computer and Network Security
Computer and Network Security Common Criteria R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 [email protected] Common Criteria Consistent
Technical information on the IT security certification of products, protection profiles and sites
Technical information on the IT security certification of products, protection profiles and sites (including confirmations in accordance with SigG) BSI 7138 Version 2.1, as per 5 November 2012 Document
Russian IT Security Certification Scheme: Steps Toward Common Criteria Approach
6 15th International Common Criteria Conference, New Delhi, India Russian IT Security Certification Scheme: Steps Toward Common Criteria Approach Alexander Barabanov 1, Alexey Markov 1, Valentin Tsirlov
Low Assurance Protection Profile for a VoIP Infrastructure
Low Assurance Protection Profile for a VoIP Infrastructure Version 1.1 Date Author(s) Dirk-Jan Out Certification ID Sponsor File name No of pages 12 TNO-ITSEF BV VoIP Low Assurance Protection Profile 1.1
Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
BSI-DSZ-CC-S-0040-2015. for. Dream Chip Technologies GmbH Germany. Dream Chip Technologies GmbH
BSI-DSZ-CC-S-0040-2015 for Dream Chip Technologies GmbH Germany of Dream Chip Technologies GmbH BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228
FSSC 22000. Certification scheme for food safety systems in compliance with ISO 22000: 2005 and technical specifications for sector PRPs PART II
FSSC 22000 Certification scheme for food safety systems in compliance with ISO 22000: 2005 and technical specifications for sector PRPs PART II REQUIREMENTS AND REGULATIONS FOR CERTIFICATION BODIES Foundation
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
Citrix NetScaler Platinum Edition Load Balancer
122-B CERTIFICATION REPORT No. CRP262 Citrix NetScaler Platinum Edition Load Balancer Version 9.2 running on platforms MPX 5500, MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS, MPX 7500,
SAMSUNG SDS FIDO Server Solution V1.1 Certification Report
KECS-CR-15-73 SAMSUNG SDS FIDO Server Solution V1.1 Certification Report Certification No.: KECS-ISIS-0645-2015 2015. 9. 10 IT Security Certification Center History of Creation and Revision No. Date Revised
GSA FIPS 201 Evaluation Program
GSA FIPS 201 Evaluation Program David Temoshok Director, Federal Identity Policy and Management GSA Office of Governmentwide Policy NIST/DHS/TSA TWIC QPL Workshop April 21, 2010 1 HSPD-12 Government-wide
Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
CP14 ISSUE 5 DATED 1 st OCTOBER 2015 BINDT Audit Procedure Conformity Assessment and Certification/Verification of Management Systems
Certification Services Division Newton Building, St George s Avenue Northampton, NN2 6JB United Kingdom Tel: +44(0)1604-893-811. Fax: +44(0)1604-893-868. E-mail: [email protected] CP14 ISSUE 5 DATED 1 st OCTOBER
Prospects Mutual Recognition in ASEAN and the Role of Veterinary Statutory Bodies (VSBs) in the Philippines. Ma. Elizabeth D. Callanta, DVM, MSc
Prospects Mutual Recognition in ASEAN and the Role of Veterinary Statutory Bodies (VSBs) in the Philippines Ma. Elizabeth D. Callanta, DVM, MSc SEAN Framework Agreement on Services (AFAS) Article V Each
BSI-DSZ-CC-S-0035-2014. for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.
BSI-DSZ-CC-S-0035-2014 for GLOBALFOUNDRIES Singapore Pte. Ltd. of GLOBALFOUNDRIES Singapore Pte. Ltd. BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49
IEEE 2600-series Standards for Hardcopy Device Security
IEEE 2600-series Standards for Hardcopy Device Security Brian Smithson PM, Security Research Ricoh Americas Corporation Lead Editor IEEE P2600 Standards Working Group 17 November, 2010 Ottawa, ON Agenda
Compliance Risk Assessment Measures of Financial Information Security using System Dynamics
Compliance Risk Assessment Measures of Financial Information Security using System Dynamics Ae Chan Kim 1, Su Mi Lee 2 and Dong Hoon Lee 3 1, 3 Graduate School of Information Security, Korea University
CORPORATE GOVERNANCE CODE
Contents PART I. THE BOARD OF DIRECTORS AND ITS MEMBERS... 2 PART II. OPERATIONAL RISK MANAGEMENT... 5 PART III. INTERNAL AUDIT FUNCTION... 6 PART IV. INVESTOR RELATIONS... 8 PART V. REMUNERATIONS... 10
CERTIFICATION REPORT No. CRP253
122-B CERTIFICATION REPORT No. CRP253 Citrix NetScaler Platinum Edition Load Balancer Version 9.1 (Build 100.3.cl) running on NetScaler 9010 FIPS, MPX 7000 platform, MPX 9000 platform, MPX 10000 platform
About CREST R&D Grant
1 About CREST R&D Grant Philosophy Higher value Electrical & Electronics (E&E) economic sector can be achieved when R&D thrives in the ecosystem This can be accelerated by promoting collaborative research
