{"id":451466,"date":"2024-10-20T09:17:58","date_gmt":"2024-10-20T09:17:58","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-15408-42023\/"},"modified":"2024-10-26T17:20:13","modified_gmt":"2024-10-26T17:20:13","slug":"bs-en-iso-iec-15408-42023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-15408-42023\/","title":{"rendered":"BS EN ISO\/IEC 15408-4:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
9<\/td>\n4.1 Concepts and model <\/td>\n<\/tr>\n
11<\/td>\n4.2 Deriving evaluation methods and evaluation activities <\/td>\n<\/tr>\n
13<\/td>\n4.3 Verb usage in the description of evaluation methods and evaluation activities <\/td>\n<\/tr>\n
14<\/td>\n4.4 Conventions for the description of evaluation methods and evaluation activities
5.1 Overview <\/td>\n<\/tr>\n
15<\/td>\n5.2 Specification of an evaluation method
5.2.1 Overview <\/td>\n<\/tr>\n
16<\/td>\n5.2.2 Identification of evaluation methods <\/td>\n<\/tr>\n
17<\/td>\n5.2.3 Entity responsible for the evaluation method
5.2.4 Scope of the evaluation method
5.2.5 Dependencies
5.2.6 Required input from the developer or other entities <\/td>\n<\/tr>\n
18<\/td>\n5.2.7 Required tool types
5.2.8 Required evaluator competences
5.2.9 Requirements for reporting
5.2.10 Rationale for the evaluation method <\/td>\n<\/tr>\n
20<\/td>\n5.2.11 Additional verb definitions
5.2.12 Set of evaluation activities
6.1 Overview
6.2 Specification of an evaluation activity
6.2.1 Unique identification of the evaluation activity
6.2.2 Objective of the evaluation activity <\/td>\n<\/tr>\n
21<\/td>\n6.2.3 Evaluation activity links to SFRs, SARs, and other evaluation activities
6.2.4 Required input from the developer or other entities
6.2.5 Required tool types
6.2.6 Required evaluator competences
6.2.7 Assessment strategy <\/td>\n<\/tr>\n
22<\/td>\n6.2.8 Pass\/fail criteria <\/td>\n<\/tr>\n
23<\/td>\n6.2.9 Requirements for reporting
6.2.10 Rationale for the evaluation activity <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security, cybersecurity and privacy protection. Evaluation criteria for IT security – Framework for the specification of evaluation methods and activities<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n26<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":451475,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-451466","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/451466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/451475"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=451466"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=451466"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=451466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}