EAL 3 Evaluation of - Common Criteria
EAL 3 Evaluation of - Common Criteria
EAL 3 Evaluation of - Common Criteria
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CCS Certification Report RSA enVision® v4.0 SP 1<br />
15 Acronyms, Abbreviations and Initializations<br />
Acronym/Abbreviation/<br />
Initialization<br />
CCEF<br />
CCS<br />
CPL<br />
DAS<br />
<strong>EAL</strong><br />
ETR<br />
IT<br />
ITSET<br />
NAS<br />
OS<br />
PALCAN<br />
NVD<br />
QA<br />
SFR<br />
SIEM<br />
SQL<br />
ST<br />
TOE<br />
TSF<br />
UI<br />
VAM<br />
16 References<br />
Description<br />
<strong>Common</strong> <strong>Criteria</strong> <strong>Evaluation</strong> Facility<br />
Canadian <strong>Common</strong> <strong>Criteria</strong> <strong>Evaluation</strong> and<br />
Certification Scheme<br />
Certified Products list<br />
Direct Attached Storage<br />
<strong>Evaluation</strong> Assurance Level<br />
<strong>Evaluation</strong> Technical Report<br />
Information Technology<br />
Information Technology Security <strong>Evaluation</strong><br />
and Testing<br />
Network Attached Storage<br />
Operating System<br />
Program for the Accreditation <strong>of</strong> Laboratories<br />
- Canada<br />
National Vulnerability Database (from<br />
Homeland Security)<br />
Quality Assurance<br />
Security Functional Requirement<br />
Security Information Event Management<br />
Structured Query Language<br />
Security Target<br />
Target <strong>of</strong> <strong>Evaluation</strong><br />
TOE Security Function<br />
User Interface<br />
RSA Vulnerability and Asset Management<br />
tool<br />
This section lists all documentation used as source material for this report:<br />
• CCS Publication #4, Technical Oversight, Version 1.1, August 2005.<br />
• <strong>Common</strong> <strong>Criteria</strong> for Information Technology Security <strong>Evaluation</strong>, Version 3.1<br />
Revision 2, September 2007.<br />
• <strong>Common</strong> Methodology for Information Technology Security <strong>Evaluation</strong>, CEM,<br />
Version 3.1 Revision 2, September 2007.<br />
___________________________________________________________________________<br />
Version 1.0 22 January 2010<br />
- Page 10 <strong>of</strong> 11 -