Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Need list of security standards

Posted on 2001-07-31
1
Medium Priority
?
183 Views
Last Modified: 2010-04-11
I need a list of implemented security standards. Those that I know of are the C1 and C2 standards that the DOD did awhile ago.

The story is that I'm working on a product that needs to be secure and I would rather adopt an already existing standard rather than making up my own.
0
Comment
Question by:htj
1 Comment
 
LVL 14

Accepted Solution

by:
chris_calabrese earned 800 total points
ID: 6338130
C1 and C2 aren't recognized any more.  They've been replaced by the Common Criteria project, which is a joint project between several nations.

The equivelant of C2 is now something called Controled Access Protection Profile.  See http://www.radium.ncsc.mil/tpep/library/protection_profiles/index.html for more info.

Other places to look are the Center for Internet Security (http://www.cisecurity.org/), the SANS Institute (http://www.sans.org), ICSA Labs (http://www.icsalabs.com/html/certification/index.shtml), and the Generally Accepted System Security Principles site (http://web.mit.edu/security/www/gassp1.html).
0

Featured Post

WatchGuard Case Study: NCR

With business operations for thousands of customers largely depending on the internal systems they support, NCR can’t afford to waste time or money on security products that are anything less than exceptional. That’s why they chose WatchGuard.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is about my experience upgrading my consulting machine to Windows 10 Version 1709 (The Fall 2017 Creator Update)
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question