• baner CCMODE
Print

Basic processes of CC methodology

Written by Super User. Posted in Quick start

1. TOE security development

In the process of security development, and on the basis of different security analyses, the Security Target (ST) document is prepared. This document is a set of: security functional requirements (see: www.tools.commoncriteria.pl/ccHelp/#SFR), which describe how security measures should work, and security assurance requirements (see: www.tools.commoncriteria.pl/ccHelp/#SAR), which tell how much assurance these measures can offer.

2. TOE product development

The process concerns the development of an IT product, including its documentation. The set of security functions, determined in ST, is implemented in the TOE according to the adopted technology and on the assumed EAL.

3. IT security evaluation

The security evaluation process is conducted on the basis of an evaluation scheme developed in a given country. The basic tool for this process is the security evaluation methodology CEM (see: www.tools.commoncriteria.pl/ccHelp/#CEM)

About Us

The Institute of Innovative Technologies EMAG is an R&D organization involved in the development and deployment of state-of-the-art devices, systems and technologies.

Contact Us

emag-logo
Institute of Innovative Technologies EMAG
40-189 Katowice, ul. Leopolda 31
tel. + 48 (32) 2007-805,
e-mail: ccmode@ibemag.pl

 

 

Mighty Free Joomla Templates by MightyJoomla