Common Criteria Concepts
Described in:
Security Targets (ST)
Vendor claims (“I provide”)
Implementation specific
Protection Profiles (PP)
User requirements (“I want”)
Multiple implementations may satisfy
UNCLASSIFIED
UNCLASSIFIED
Previous slide
Next slide
Back to first slide
View graphic version