Solved

Need list of security standards

Posted on 2001-07-31
1
177 Views
Last Modified: 2010-04-11
I need a list of implemented security standards. Those that I know of are the C1 and C2 standards that the DOD did awhile ago.

The story is that I'm working on a product that needs to be secure and I would rather adopt an already existing standard rather than making up my own.
0
Comment
Question by:htj
1 Comment
 
LVL 14

Accepted Solution

by:
chris_calabrese earned 200 total points
ID: 6338130
C1 and C2 aren't recognized any more.  They've been replaced by the Common Criteria project, which is a joint project between several nations.

The equivelant of C2 is now something called Controled Access Protection Profile.  See http://www.radium.ncsc.mil/tpep/library/protection_profiles/index.html for more info.

Other places to look are the Center for Internet Security (http://www.cisecurity.org/), the SANS Institute (http://www.sans.org), ICSA Labs (http://www.icsalabs.com/html/certification/index.shtml), and the Generally Accepted System Security Principles site (http://web.mit.edu/security/www/gassp1.html).
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Event 4625 - Account Name: _ 3 64
google exe file 5 145
Malware infection with local user rights? 6 47
Configuring DNS Round Robin in Windows DNS server ? 8 65
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question