Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
519 Dec 2014 - 15:14ThomasMisa 
422 Nov 2014 - 23:36ThomasMisa 
303 Oct 2013 - 15:18norqu036? 
224 Jun 2013 - 09:11NicLewis 
113 Jun 2013 - 13:58NicLewisAttached file CCPART1V3.1R4.pdf

Attached file CCPART2V3.1R4.pdf

Attached file CCPART3V3.1R4.pdf

Attached file CEMV3.1R4.pdf

Attached file CCPART1V3.1R3.pdf

Attached file CCPART2V3.1R3.pdf

Attached file CCPART3V3.1R3.pdf

Attached file CEMV3.1R3.pdf

Attached file CCPART1V3.1R1.pdf

Attached file CCPART2V3.1R2.pdf

Attached file CCPART3V3.1R2.pdf

Attached file CEMV3.1R2.pdf

Attached file CCPART1V3.1R1.pdf

Attached file CCPART2V3.1R1.pdf

Attached file CCPART3V3.1R1.pdf

Attached file CEMV3.1R1.pdf

Attached file cc_v23_part1.pdf

Attached file cc_v23_part2.pdf

Attached file cc_v23_part3.pdf

Attached file cem_v23.pdf

Attached file cc_introduction-v2.pdf

Attached file cc_users_guide.pdf

Attached file cc-cem_transition_guide_2.3_to_3.1.pdf

Attached file Basic_Robustness_v2.3_to_v3.1_-_Updated_01-07-2008.pdf

Attached file Medium_Robustness_v2.3_to_v3.1_-_Updated_01-07-2008.pdf

Attached file ccmb-2005-07-001.pdf

Attached file ccmb-2005-07-002.pdf

Attached file ccmb-2005-07-003.pdf

Attached file ccmb-2005-07-004.pdf

Attached file cc_v22_part1.pdf

Attached file cc_v22_part2.pdf

Attached file cc_v22_part3.pdf

Attached file cem_v12.pdf

Attached file cc_v21_part1.pdf

Attached file cc_v21_part2.pdf

Attached file cc_v21_part3.pdf

Attached file cem_v1.pdf

Attached file alc_flrv11.pdf

Attached file ccpart1v2.4r256.pdf

Attached file ccpart3v2.4r256.pdf

Attached file cemv2.4r256.pdf 

Render style:     Context:


 History: r5 < r4 < r3 < r2 < r1
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Programs>ProgramsCommonCriteria (19 Dec 2014, ThomasMisa)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Common Criteria

 

The Common Criteria is the computer security evaluation scheme that replaced the 1985 Trusted Computer Security Evaluation Criteria (TCSEC), the DoD standard that provided criteria for the development and evaluation of the security of computer systems. The Common Criteria is an evolving set of documents that began as an attempt to combine multiple criteria with the TCSEC. Criticism of the TCSEC standard's focus on military security requirements, which emphasized data confidentiality over the data integrity requirements of commercial interests, contributed to the drive to develop a more inclusive set of evaluation criteria.

The advancement of security modeling and standards outside the United States following the adoption of the TCSEC also contributed toward the goal of a more inclusive standard. Developed in the mid-1990s, the first official Common Criteria standard was published in 1996, the result of a collaborative effort among the United States, Great Britain, Germany, France, The Netherlands, and Canada, working in conjunction with the International Standards Organization (ISO). The Common Criteria employs seven defined security Evaluation Assurance Levels (EAL1-EAL7), which are closely related to the evaluation levels found in the TCSEC. The National Information Assurance Partnership (NIAP) is the body that maintains oversight of the Common Criteria evaluation standard in the United States, with similar bodies in the other participating nations.(1)(2)

Additional Resources:

CC v3.1/CEM v3.1 (September 2012)

  • CEMV3.1R4.pdf: Common Methodology for Information Technology Security Evaluation (v3.1 Revision 4)

CC v3.1/CEM v3.1 (July 2009)

  • CEMV3.1R3.pdf: Common Methodology for Information Technology Security Evaluation (v3.1 Revision 3)

CC v3.1/CEM v3.1 (September 2007)

  • CEMV3.1R2.pdf: Common Methodology for Information Technology Security Evaluation (v3.1 Revision 2)

CC v3.1/CEM v3.1 (September 2006)

  • CEMV3.1R1.pdf: Common Methodology for Information Technology Security Evaluation (v3.1)

CC v2.3/CEM v2.3 (August 2005)

  • cem_v23.pdf: Common Methodology for Information Technology Security Evaluation (v2.3)

Useful Documents

Transition Documents

CC Draft Version 3.0 (June 2005)

CC v2.2/CEM v1.2 (January 2004)

  • cem_v12.pdf: Common Methodology for Information Technology Security Evaluation (v2.2, Rev 256)

CC v2.1/CEM v1.0 (August 1999)

  • cem_v1.pdf: Common Methodology for IT Security Evaluation, v1.0

Draft ASE/APE Update (March 2004)

  • cemv2.4r256.pdf: Common Methodology for Information Technology Security Evaluation (2.4)

Notes

1 : Jeffrey R. Yost, "A History of Computer Security Standards," 606-610, in Karl de Leeuw and Jan Bergstra, eds., The History of Information Security: A Comprehensive Handbook, (Oxford, UK: Elsevier, 2007), 595-621.

2 : http://www.niap-ccevs.org/Documents_and_Guidance/cc_docs.cfm


Topic attachments
I Attachment Action Size Date Who CommentSorted ascending
pdfpdf cc_introduction-v2.pdf manage 447.5 K 13 Jun 2013 - 11:42 NicLewis CC - An Introduction (v2)
pdfpdf cc_users_guide.pdf manage 341.2 K 13 Jun 2013 - 11:43 NicLewis CC User Guide (Oct 1999)
pdfpdf alc_flrv11.pdf manage 170.8 K 13 Jun 2013 - 12:12 NicLewis CEM Supplement ALC_FLR - Flaw Remediation (v1.1)
pdfpdf cemv2.4r256.pdf manage 857.9 K 13 Jun 2013 - 12:16 NicLewis Common Methodology for Information Technology Security Evaluation (2.4)
pdfpdf cem_v12.pdf manage 1293.2 K 13 Jun 2013 - 12:04 NicLewis Common Methodology for Information Technology Security Evaluation (v2.2, Rev 256)
pdfpdf cem_v23.pdf manage 3294.4 K 13 Jun 2013 - 11:38 NicLewis Common Methodology for Information Technology Security Evaluation (v2.3)
pdfpdf CEMV3.1R2.pdf manage 3078.3 K 13 Jun 2013 - 11:08 NicLewis Common Methodology for Information Technology Security Evaluation (v3.1 Revision 2)
pdfpdf CEMV3.1R3.pdf manage 2952.2 K 13 Jun 2013 - 10:58 NicLewis Common Methodology for Information Technology Security Evaluation (v3.1 Revision 3)
pdfpdf CEMV3.1R4.pdf manage 1299.0 K 13 Jun 2013 - 10:51 NicLewis Common Methodology for Information Technology Security Evaluation (v3.1 Revision 4)
pdfpdf CEMV3.1R1.pdf manage 2293.9 K 13 Jun 2013 - 11:29 NicLewis Common Methodology for Information Technology Security Evaluation (v3.1)
pdfpdf cem_v1.pdf manage 901.9 K 13 Jun 2013 - 12:11 NicLewis Common Methodology for IT Security Evaluation, v1.0
pdfpdf Basic_Robustness_v2.3_to_v3.1_-_Updated_01-07-2008.pdf manage 67.9 K 13 Jun 2013 - 11:47 NicLewis Element-by-element translation of Basic Robustness into CCv3.1
pdfpdf Medium_Robustness_v2.3_to_v3.1_-_Updated_01-07-2008.pdf manage 108.6 K 13 Jun 2013 - 11:49 NicLewis Element-by-element translation of Medium Robustness into CCv3.1
pdfpdf ccmb-2005-07-004.pdf manage 3256.3 K 13 Jun 2013 - 11:56 NicLewis Evaluation methodology (Draft v3.0 Rev 2)
pdfpdf ccmb-2005-07-001.pdf manage 693.2 K 13 Jun 2013 - 11:52 NicLewis Part 1: Introduction and general model (Draft v3.0 Rev 2)
pdfpdf cc_v21_part1.pdf manage 260.1 K 13 Jun 2013 - 12:07 NicLewis Part 1: Introduction and general model (v2.1)
pdfpdf cc_v22_part1.pdf manage 449.0 K 13 Jun 2013 - 11:59 NicLewis Part 1: Introduction and general model (v2.2, Rev 256)
pdfpdf cc_v23_part1.pdf manage 917.3 K 13 Jun 2013 - 11:35 NicLewis Part 1: Introduction and general model (v2.3)
pdfpdf ccpart1v2.4r256.pdf manage 719.6 K 13 Jun 2013 - 12:14 NicLewis Part 1: Introduction and general model (v2.4)
pdfpdf CCPART1V3.1R3.pdf manage 1238.3 K 13 Jun 2013 - 10:55 NicLewis Part 1: Introduction and general model (v3.1 Revision 3)
pdfpdf CCPART1V3.1R1.pdf manage 561.6 K 13 Jun 2013 - 11:14 NicLewis Part 1: Introduction and general model (v3.1)
pdfpdf ccmb-2005-07-002.pdf manage 1116.4 K 13 Jun 2013 - 11:53 NicLewis Part 2: Security functional components (Draft v3.0 Rev 2)
pdfpdf cc_v21_part2.pdf manage 1043.5 K 13 Jun 2013 - 12:08 NicLewis Part 2: Security Functional Requirements (v2.1)
pdfpdf cc_v22_part2.pdf manage 932.8 K 13 Jun 2013 - 12:01 NicLewis Part 2: Security functional requirements (v2.2, Rev 256)
pdfpdf cc_v23_part2.pdf manage 2822.7 K 13 Jun 2013 - 11:36 NicLewis Part 2: Security Functional Requirements (v2.3)
pdfpdf CCPART2V3.1R2.pdf manage 2784.3 K 13 Jun 2013 - 11:05 NicLewis Part 2: Security Functional Requirements (v3.1 Revision 2)
pdfpdf CCPART2V3.1R3.pdf manage 2884.7 K 13 Jun 2013 - 10:56 NicLewis Part 2: Security Functional Requirements (v3.1 Revision 3)
pdfpdf CCPART2V3.1R4.pdf manage 987.8 K 13 Jun 2013 - 10:48 NicLewis Part 2: Security Functional Requirements (v3.1 Revision 4)
pdfpdf CCPART2V3.1R1.pdf manage 1851.8 K 13 Jun 2013 - 11:17 NicLewis Part 2: Security Functional Requirements (v3.1)
pdfpdf ccmb-2005-07-003.pdf manage 1930.7 K 13 Jun 2013 - 11:55 NicLewis Part 3: Security assurance components (Draft v3.0 Rev 2)
pdfpdf CCPART3V3.1R4.pdf manage 1005.9 K 13 Jun 2013 - 10:50 NicLewis Part 3: Security Assurance Requirement (v3.1 Revision 4)
pdfpdf cc_v21_part3.pdf manage 653.8 K 13 Jun 2013 - 12:10 NicLewis Part 3: Security Assurance Requirements (v2.1)
pdfpdf cc_v22_part3.pdf manage 697.5 K 13 Jun 2013 - 12:03 NicLewis Part 3: Security Assurance Requirements (v2.2, Rev 256)
pdfpdf cc_v23_part3.pdf manage 1611.3 K 13 Jun 2013 - 11:37 NicLewis Part 3: Security Assurance Requirements (v2.3)
pdfpdf ccpart3v2.4r256.pdf manage 770.1 K 13 Jun 2013 - 12:15 NicLewis Part 3: Security Assurance Requirements (v2.4)
pdfpdf CCPART3V3.1R2.pdf manage 2857.4 K 13 Jun 2013 - 11:06 NicLewis Part 3: Security Assurance Requirements (v3.1 Revision 2)
pdfpdf CCPART3V3.1R3.pdf manage 2863.3 K 13 Jun 2013 - 10:57 NicLewis Part 3: Security Assurance Requirements (v3.1 Revision 3)
pdfpdf CCPART3V3.1R1.pdf manage 2073.2 K 13 Jun 2013 - 11:27 NicLewis Part 3: Security Assurance Requirements (v3.1)
pdfpdf CCPART1V3.1R4.pdf manage 593.1 K 13 Jun 2013 - 10:43 NicLewis Sept. 2012, Part 1: Introduction and general model (v3.1 Revision 4)
pdfpdf cc-cem_transition_guide_2.3_to_3.1.pdf manage 155.5 K 13 Jun 2013 - 11:46 NicLewis Transition Guide: Summary of Changes in the CC/CEM from v2.3 to v3.1
Topic revision: r5 - 19 Dec 2014 - 15:14:26 - ThomasMisa
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback