Customer Service:
Mon - Fri: 8:30 am - 6 pm EST

 Most recent

ISO/IEC TR 15443-2:2012

Information technology - Security techniques - Security assurance framework - Part 2: Analysis

ISO/IEC TR 15443-2:2012 builds on the concepts presented in ISO/IEC TR 15443-1. It provides a discussion of the attributes of security assurance conformity assessment methods that contribute towards making assurance claims and providing assurance evidence to fulfil meeting the assurance requirements for a deliverable.

ISO/IEC TR 15443-2:2012 proposes criteria for comparing and analysing different SACA methods. The reader is cautioned that the methods used as examples in ISO/IEC TR 15443-2:2012 are considered to represent popularly used methods at the time of its writing. New methods may appear, and modification or withdrawal of the methods cited may occur. It is intended that the criteria can be used to describe and compare any SACA method whatever its provenance.


Content Provider
International Organization for Standardization [iso]


Others Also Bought

Information technology - Security techniques - Security assurance framework - Part 1: Introduction and concept ...
Information technology - Security techniques - Guidelines for cybersecurity
Information technology - Security techniques - Code of practice for protection of personally identifiable information ...
Included in Packages
This standard is not included in any packages.
Amendments & Corrections
We have no amendments or corrections for this standard.
ANSI Logo

As the voice of the U.S. standards and conformity assessment system, the American National Standards Institute (ANSI) empowers its members and constituents to strengthen the U.S. marketplace position in the global economy while helping to assure the safety and health of consumers and the protection of the environment.

CUSTOMER SERVICE
NEW YORK OFFICE
ANSI HEADQUARTERS