Part 1 Contents

1 Scope
2 Definitions
2.1 Common abbreviations
2.2 Scope of glossary
2.3 Glossary
3 Overview
3.1 Introduction
3.2 Target audience of the CC
3.2.1 Consumers
3.2.2 Developers
3.2.3 Evaluators
3.2.4 Others
3.3 Evaluation context
3.4 Organisation of the Common Criteria .
4 General model
4.1 Security context
4.1.1 General security context
4.1.2 Information technology security context
4.2 Common Criteria approach
4.2.1 Development
4.2.2 TOE evaluation
4.2.3 Operation
4.3 Security concepts
4.3.1 Security environment
4.3.2 Security objectives
4.3.3 IT security requirements
4.3.4 TOE summary specification
4.3.5 TOE implementation
4.4 CC descriptive material
4.4.1 Expression of security requirements
4.4.2 Use of security requirements
4.4.3 Sources of security requirements
4.5 Types of evaluation
4.5.1 PP evaluation
4.5.2 ST evaluation
4.5.3 TOE evaluation
4.6 Assurance maintenance
5 Common Criteria requirements and evaluation results
5.1 Introduction
5.2 Requirements in PPs and STs
5.2.1 PP evaluation results
5.3 Requirements in TOE
5.3.1 TOE evaluation results
5.4 Caveats on evaluation results
5.5 Use of TOE evaluation results
Annex A The Common Criteria project
A.1 Background
A.2 Development of the Common Criteria
A.3 Sponsoring organisations
Annex B Specification of Protection Profiles
B.1 Overview
B.2 Content of Protection Profile
B.2.1 Content and presentation
B.2.2 PP introduction
B.2.3 TOE description
B.2.4 TOE security environment
B.2.5 Security objectives
B.2.6 IT security requirements
B.2.7 Application notes
B.2.8 Rationale
Annex C Specification of Security Targets
C.1 Overview
C.2 Content of Security Target
C.2.1 Content and presentation
C.2.2 ST introduction
C.2.3 TOE description
C.2.4 TOE security environment
C.2.5 Security objectives
C.2.6 IT security requirements
C.2.7 TOE summary specification
C.2.8 PP claims
C.2.9 Rationale
Annex D Bibliography
 
(Part 2
 
Security functional requirements)
(Part 3 Security assurance requirements)