Solved

Need list of security standards

Posted on 2001-07-31
1
179 Views
Last Modified: 2010-04-11
I need a list of implemented security standards. Those that I know of are the C1 and C2 standards that the DOD did awhile ago.

The story is that I'm working on a product that needs to be secure and I would rather adopt an already existing standard rather than making up my own.
0
Comment
Question by:htj
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 14

Accepted Solution

by:
chris_calabrese earned 200 total points
ID: 6338130
C1 and C2 aren't recognized any more.  They've been replaced by the Common Criteria project, which is a joint project between several nations.

The equivelant of C2 is now something called Controled Access Protection Profile.  See http://www.radium.ncsc.mil/tpep/library/protection_profiles/index.html for more info.

Other places to look are the Center for Internet Security (http://www.cisecurity.org/), the SANS Institute (http://www.sans.org), ICSA Labs (http://www.icsalabs.com/html/certification/index.shtml), and the Generally Accepted System Security Principles site (http://web.mit.edu/security/www/gassp1.html).
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Make the most of your online learning experience.
A look at what happened in the Verizon cloud breach.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month7 days, 18 hours left to enroll

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question